2022 Cyber Awareness Crossword Puzzle
Across
- 2. Use _______ thinking to discern disinformation
- 7. What disinformation becomes when it gets spread by people who aren’t aware it’s fake
- 8. According to nearly every study conducted over the last decade, _______________ is involved in the vast majority of cyber attacks. (Two Words)
- 9. Our ongoing commitment to preventing unauthorized access, both externally and internally, to confidential information can be defined as ________
- 11. Voice Phishing is called _______
- 13. _____ save your login information when you’re using a web browser
- 14. Security is only as strong as your weakest ________
Down
- 1. Always ______ Enact’s security policies
- 3. A type of malicious software designed to block access to a computer system until a sum of money is paid; often starts with a phishing email
- 4. Refers to the appropriate use of any data that is collected, stored, and transmitted
- 5. Pay close attention to _____ especially on your mobile device where they may be hard to verify
- 6. If something sounds too good to be true… there’s probably a _______ behind it
- 10. Email classification for general business information shared with a customer
- 12. Lost laptops, vishing phone calls, unbadged stranger in the building, are all examples of Security _________