This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 1

Know What You Have

Start here. Use the tools below to take an inventory of your devices and accounts to know what items need to be secured and to identify your risks.

Security Awareness Overview

First things first: Knowing what you have is the first step to better security. Identify all of your devices (including desktops, laptops, smartphones and printers) and applications (e.g., email, software, web browsers, websites) so you can take the steps to secure them.

This inventory will serve as a guide and checklist as you make your way through the rest of the toolboxes. Keep this list updated as you add or remove devices and applications.

1.1 Identify Your Devices

Narrow your search by selecting your OS
Type
1
Level
4h 0min
Time

CIS Hardware and Software Asset Tracker

Use this spreadsheet to track your hardware, software, and sensitive information.

Security Scorecard logo
Type
2
Level
0h 15min
Time

SecurityScorecard Security Ratings

Use this tool to rate, understand, and continuously monitor your organization's cybersecurity risk.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Recently Added

Check a Website

Check a website is an easy-to-use online tool which helps determine whether a website is likely to be legitimate or a scam…before...

Read More
Recently Added Wizer Logo

Security Awareness Training

Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...

Read More
Calculator image

Cost of Downtime Calculator

Network problems are costly in more ways that one – unhappy customers, loss of business opportunities, and most obviously,...

Read More

Know What You Have - Backgrounder

Download the attached PDF to find out why knowing what you have is an important step towards lowering your risk of cyber...

Read More

How to Inventory Your Devices, Applications, and Accounts

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More

Data Classification Policy

This sample policy will assist your organization in establishing a framework for classifying your organization’s data based...

Read More

Asset Inventory Policy

This sample policy will assist your organization with creating an asset inventory and with the controls to identify, track,...

Read More

Salesforce Trailhead

Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...

Read More
Curricula logo

Curricula Security Awareness Platform

Curricula is a free security awareness training platform that SMBs can use to build a fun and positive security culture....

Read More