Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 65: Line 65:
* Understanding Cybersecurity Hygiene
* Understanding Cybersecurity Hygiene
* Finding Fundamental Tools
* Finding Fundamental Tools
* Implementing Basic Hygiene
* Ensuring Basic Hygiene
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |

Revision as of 01:22, 7 August 2023

ACT NOW
Curious fox 4.png
High Risk Communities
Bees-1.png
Need Help?
German-shepherds.png
Find What You Need
Inquisitive raven 2.png
  • Use SSO, Strong Passwords, & 2FA
  • Install Antivirus & VPN Software
  • Automate Device & Software Updates
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
Ask Here
Find Your Community
Owls.png
Top Threats
Stalking-hyenas.png
Basic Protection
Rhinos.png
Advanced Protection
Elephants.png
  • Navigating by Community Need
  • Understanding Your Needs
  • Finding Community-Specific Resources
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection