This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 2

Update Your Defenses

You boost your digital immunity against threats such as viruses, spyware and more when you keep your systems updated. Most devices and applications can be configured to automatically update.

Most devices and applications can be configured to automatically update. First, see the inventory list you created in the Know What You Have toolbox to go through each device and application you have to configure for automatic updates. Check the instructions or support pages for your devices or application. 

Check each item off your list as you go, and be sure to take this step every time you start using a new device or application. Also, see if there are recommended security settings – a “configuration” – for your devices and applications.

Internet of Things (IoT) devices need to stay up to date too. In 2019, security researchers found that Wi-Fi-enabled cameras from an industry-leading manufacturer could have ransomware remotely installed, disabling access to photos taken by that camera. Smart speakers and other similar devices should only be used in areas where there is no expectation of privacy, and they should be updated frequently.

2.2 Encrypt Your Data

Narrow your search by selecting your OS
Type
2
Level
0h 20min
Time

ProtonVPN

Use this tool to ensure your Internet connection is secure and private.

Type
1
Level
0h 15min
Time

BitLocker for Microsoft Windows

Use this tool to encrypt your Microsoft Windows systems.

Type
1
Level
0h 10min
Time

FileVault for Mac

Use this tool to encrypt your Mac systems.

Type
3
Level
1h 0min
Time

PGP

Use this tool to encrypt emails with public key cryptography.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Recently Added Wizer Logo

Security Awareness Training

Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...

Read More
Recently Added Encrypt Email image

How to Encrypt Email

Email encryption is the process of disguising the content of your email messages to protect them from being read by unwanted...

Read More
GCA logo

Update Your Defenses - Backgrounder

Download the attached PDF to find out why its important to ‘Update Your Defenses’.  

Read More

Blacklight

Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site—and...

Read More

Software Updates and Business Security

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More

System and Network Security Policy

This sample policy will assist your organization with establishing a framework to protect against system and network intrusions...

Read More

Salesforce Trailhead

Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...

Read More

USB Use Policy

Use/customize this template to build your company's USB use policy.

Read More

Patching Policy

Use/customize this template to build your company's patching policy.

Read More