This Site Requires JavaScript Enabled.

Guide

Recently Added GCA logo

How to Recover from Password Exposure

This free guide that contains steps for recovering from such incidents where your password may have been exposed. It highlights...

Read More
Recently Added Phishing image on keyboard

Report Phishing Scams and Fraud

Read More

Handbook for Civil Society Organizations

Read More
Recently Added Blueprint for Ransomware Defense

Blueprint for Ransomware Defense

The Blueprint for Ransomware Defense is a set of actionable and achievable Safeguards aimed at small- and medium-sized enterprises...

Read More
Recently Added NCSC logo

Browser-Based Password Managers

Should I use a browser-based password manager? Many web browsers now come with password managers built in, and they can be...

Read More
Recently Added Encrypt Email image

How to Encrypt Email

Email encryption is the process of disguising the content of your email messages to protect them from being read by unwanted...

Read More
VPN Ratings logo

What is a VPN?

This resource provides an overview of virtual private networks (VPNs) including how they work, what kinds of protection they...

Read More
GCA logo

Protect Your Email and Reputation - Backgrounder

Download the attached PDF to find out what email domain spoofing is and how DMARC can help protect against the malicious...

Read More
GCA logo

Backup and Recover - Backgrounder

Download the attached PDF to find out what ransomware is and why it’s important to back up your data.

Read More
GCA logo

Prevent Phishing and Malware - Backgrounder

Download the attached PDF to find out why it’s important to use real time Anti-Virus and DNS filtering.

Read More