This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.

STEP 1

Know What You Have

Start here. Use the tools below to take an inventory of your devices and accounts to know what items need to be secured.

Security Awareness Overview

First things first: Knowing what you have is the first step to better security. Identify all of your devices (including desktops, laptops, smartphones and printers) and applications (e.g., email, software, web browsers, websites) so you can take the steps to secure them.

This inventory will serve as a guide and checklist as you make your way through the rest of the toolboxes. Keep this list updated as you add or remove devices and applications.

1.1 Identify Your Devices

Narrow your search by selecting your OS
Type
1
Level
4h 0min
Time

CIS Hardware and Software Asset Tracker

Use this spreadsheet to track your hardware, software, and sensitive information.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Salesforce Trailhead

Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...

Read More

Understanding Cyber Risk for Small Business

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More