Enhanced Protection: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
</div></div> | </div></div> | ||
|- | |- | ||
| style="vertical-align: | | style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:<br><br> | ||
#Install Anti-Virus Software. | #Install Anti-Virus Software. | ||
#Install an Ad Blocker. | #Install an Ad Blocker. | ||
#Use DNS Security. | #Use DNS Security. | ||
</div></div> | </div></div> | ||
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;">Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br> | |||
| style="vertical-align: | |||
#Setup backups for your important data. | #Setup backups for your important data. | ||
#Learn how to restore your data. | #Learn how to restore your data. | ||
#Encrypt your backups. | #Encrypt your backups. | ||
</div> | </div></div> | ||
| style="vertical-align: | | style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;">Protect your reputation and secure your e-mail against those who mean you harm:<br><br> | ||
#Setup junk mail filtering. | #Setup junk mail filtering. | ||
#Protect your social media accounts. | #Protect your social media accounts. | ||
#Consider identity, credit, and title monitoring. | #Consider identity, credit, and title monitoring. | ||
</div> | </div></div> | ||
|} | |} |
Revision as of 00:02, 7 August 2023
Know What You Have
File:Know-what-you-have.png Create an inventory to know what you need to protect and to identify your risks:
|
Update Your Defenses
File:Update-your-defenses.png Boost your digital immunity against threats by updating your systems regularly:
|
Beyond Simple Passwords
File:Beyond-simple-passwords.png Level up your password game to protect your devices and accounts:
| |
Prevent Phishing & Malware
File:Prevent-phishing-malware.png Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:
|
Backup & Recover
File:Backup-recover.png Say NO to Ransomware gangs and scammers that lock your data and demand payment:
|
Protect Your Email & Reputation
File:Protect-email-reputation.png Protect your reputation and secure your e-mail against those who mean you harm:
|