STEP 2
Update Your Defenses
You boost your digital immunity against threats such as viruses, spyware and more when you keep your systems updated. Most devices and applications can be configured to automatically update.
Internet of Things (IoT) devices need to stay up to date too. In 2019, security researchers found that Wi-Fi-enabled cameras from an industry-leading manufacturer could have ransomware remotely installed, disabling access to photos taken by that camera. Smart speakers and other similar devices should only be used in areas where there is no expectation of privacy, and they should be updated frequently.
Use this tool to get a free digital certificate to enable HTTPS (SSL/TLS) for your website.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...
Email encryption is the process of disguising the content of your email messages to protect them from being read by unwanted...
Download the attached PDF to find out why its important to ‘Update Your Defenses’.
Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site—and...
GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....
This sample policy will assist your organization with establishing a framework to protect against system and network intrusions...
Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/