Enhanced Protection

From GCA ACT
Jump to navigationJump to search
Rhinos.png
Know What You Have
File:Know-what-you-have.png
Create an inventory to know what you need
to protect and to identify your risks:
  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.


Update Your Defenses
Boost your digital immunity against threats such as
viruses by updating your systems regularly and securely:
  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
     File:Update-your-defenses.png


Beyond Simple Passwords
Level up your password game to
protect your devices and accounts:
  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
     File:Beyond-simple-passwords.png             


Prevent Phishing & Malware
Stop malware and phishing attacks in their tracks
to avoid loss of funds and data, expensive
recovery costs, and damage to your reputation:
  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
     File:Prevent-phishing-malware.png             


Backup & Recover
Say NO to Ransomware gangs and scammers
that lock your data and demand payment:
  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
     File:Backup-recover.png
Protect Your Email & Reputation
Protect your reputation and secure your
e-mail against those who mean you harm:
  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.
     File:Protect-email-reputation.png