The Final Puzzle
Across
- 2. An attempt to obtain sensitive information such as usernames, passwords, etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
- 5. When an employee gets hurt, this is considered a
- 7. The new safety tool that we use to input Near Miss observations
- 9. A tool used to carefully study and list out the safety critical portions of a job or task to deetermine hazard-mitigating actions (ie. international travel)
- 10. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- 11. Our top priority is that Nobody Gets __________
Down
- 1. Make sure you set strong _________ by using upper, lowercase, numbers, and characters, and avoid dictionary words
- 3. Cyber attackers use emails to trick you to enable them to steal our ___________
- 4. An example would be a puddle of water or an electrical wire sticking out that could potentially injure a colleague
- 6. Malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection
- 7. Common messaging platform for attackers to use for phishing attacks
- 8. Mental checks that we perform (safety self-assessments)
- 10. Remember Troy's Tips - Stop, Look, Think, and ___________