Top Threats: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Know What You Have</div> [[File:know-what-you-have.png|frameless|75px|Link=Know_What_You_Have]]</div><br><br> | | style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Know What You Have</div> [[File:know-what-you-have.png|frameless|75px|Link=Know_What_You_Have]]</div><br><br> | ||
| rowspan="3" style="vertical-align: middle; border: none;" | [[File: | | rowspan="3" style="vertical-align: middle; border: none;" | [[File:stalking-hyenas.png|frameless|225px|link=Top_Threats]] | ||
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses</div> [[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br> | | style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses</div> [[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br> | ||
|- | |- |
Revision as of 00:19, 15 July 2023
Know What You Have Link=Know_What_You_Have |
Update Your Defenses File:Update-your-defenses.png | |
Beyond Simple Passwords File:Beyond-simple-passwords.png |
Phishing & Malware File:Prevent-phishing-malware.png | |
Backup & Recover File:Backup-recover.png |
Email & Reputation File:Protect-email-reputation.png |
Malicious software designed to infiltrate and damage computer systems.
Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.
Ransomware: A type of malware that encrypts files and demands a ransom for their release.
Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.