Cybersecurity Compliance

123456789101112131415161718
Across
  1. 4. Scammers use ______ tactics to try to get a fast response.
  2. 5. If you suspect a link or attachment may be suspicious, _______ download it.
  3. 8. A good password is __________ for you, but difficult for others to guess.
  4. 12. If you believe you've clicked a bad link, notify _____ immediately.
  5. 13. Malware is most likely to enter an organization through __________.
  6. 15. Never ____________ old passwords.
  7. 16. Malicious links disguised as legitimate messages.
  8. 18. Be wary of ______________ attachments.
Down
  1. 1. Each should be unique and complicated.
  2. 2. Our e-mail security system is called __________.
  3. 3. Scams can come through e-mail,_______, phone call, or even in person.
  4. 6. No platform is ________ to breaches.
  5. 7. Using a work device for _________ use increases the risk of a cyber threat.
  6. 9. Two-factor __________ protects your account by requiring a second identity verification.
  7. 10. Don't use obvious __________ changes like substituting a number for a letter.
  8. 11. Passwords should never be __________ with anyone.
  9. 12. If you feel you have fallen prey to a scammer, notify CHN or ___________.
  10. 14. 65% of people _________ passwords.
  11. 17. 80% of breaches are related to stolen or ________ passwords.