NewMain: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created page with "{| class="wikitable" style="border: none; background-color: transparent; width: 100%;" |- ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Everyday Cybersecurity</div> frameless|100px|center|link=Everyday_Cybersecurity ! style="border: none; background-color: #FFFFFF...")
 
No edit summary
Line 5: Line 5:
[[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]]
[[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div>
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
Line 16: Line 16:
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Use Strong & Unique Passwords
* Understanding Top Threats
* Enable Two Factor Authentication (2FA)
* Discovering Protection Tools
* Be Cautious with Personal Information
* Deciding How to Protect Yourself
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Top Threats
* [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]]
* Discovering Protection Tools
* [[High Risk Communities#Coming Soon|OTHERS COMING SOON]]
* Deciding How to Protect Yourself
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
Line 40: Line 40:
|-
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]]
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
Line 55: Line 55:
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]]
* Navigate by Community
* [[High Risk Communities#Coming Soon|OTHERS COMING SOON]]
* Understanding Your Needs
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
* Locating Community Resources
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Navigate by Community
* Use Strong & Unique Passwords
* Understanding Your Needs
* Enable Two Factor Authentication (2FA)
* Locating Community Resources
* Be Cautious with Personal Information
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|

Revision as of 04:04, 30 January 2024

Curious fox 4.png
Bees-1.png
Rhinos.png
Elephants.png
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection
Stalking-hyenas.png
Owls.png
Meerkat colony 1.png
German-shepherds.png
  • Navigate by Community
  • Understanding Your Needs
  • Locating Community Resources
  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
  • Reporting Cybercrimes
  • Preventing Recurrences
  • Cybercrime Recovery Resources
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
You shouldn’t have to be a cybersecurity expert to have the tools to keep you safe. Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png