This Site Requires JavaScript Enabled.
For Individuals
Sponsored By
Toolboxes
  • Know What You Have
  • Update Your Defenses
  • Beyond Simple Passwords
  • Backup and Recover
  • Prevent Phishing and Malware
  • Communicate Securely
For Individuals
Sponsored By

The GCA Cybersecurity Toolkit for Individuals

Free and effective tools to help protect yourself from cyber risks

  • Know What You Have
  • Update Your Defenses
  • Beyond Simple Passwords
  • Backup and Recover
  • Prevent Phishing and Malware
  • Communicate Securely

Know What You Have

Start here. Knowing what you have serves as the foundation for all other aspects of what you need to do to improve your cyber hygiene. Take an inventory of your devices and accounts to know what items need to be secured and identify your risks. Keep this list updated as you add or remove devices and applications.

Understanding Cyber Risk

Customize Your Toolbox by:

Type
1
Level
4h 0min
Time

CIS Hardware and Software Asset Tracker

Use this spreadsheet to track your hardware, software, and sensitive information.

View Tool

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Web Scanner

Check a Website

Check a website is an easy-to-use online tool which helps determine whether a website is likely to be legitimate or a scam…before...

Read More
Wizer Logo
Training

Security Awareness Training

Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...

Read More
Training

Understanding Cyber Risk

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More
  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Scan
Video
Third Party Tool
Policy Document
Instructions

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/