Step 4
Prevent Phishing
and Malware
Use these tools to strengthen your defenses against phishing attacks and better defend against malware. Start by selecting your operating system.
This story echoes one that happened in 2017 at one of the largest public broadcasters in the United States. In less than a day, all 503 employees found that their phones had stopped working, access to the Internet had frozen, and hundreds of hours of recorded interviews were rendered inaccessible. A malware attacker demanded $2,500 worth of bitcoin to return every computer to normal. The malicious software was likely introduced by a contributor or employee who was permitted to install third-party software onto a station-owned computer.
The FBI advised the station not to comply with the attacker’s demands, as it might lead to further vulnerabilities. The station’s nine IT professionals took to erasing all computers and devices, leading to months of hand-written communications and analog technologies lending to broadcast. In the end the station was able to recover but only after investing nearly half a million additional dollars into cybersecurity infrastructure.
There are many ways to prevent a situation like this. They begin with a good sense of what’s safe or not safe to do on the Internet, but there are also software solutions that can catch an issue before it spirals out of control, affecting sources and colleagues.
Select “Anti-Virus” under the Category menu, and choose any one of the tools listed to assist you in installing anti-virus software on your systems.
Use this tool to secure all of your device’s Internet traffic.
Use this tool to block malicious content, ransomware, phishing and gives administrators complete visibility of network traffic using DNS filtering.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
Check a website is an easy-to-use online tool which helps determine whether a website is likely to be legitimate or a scam…before...
This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...
Totem is an online platform that offers interactive courses to learn how to increase digital security and privacy. The optimal...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/