Cybersecurity Awareness

12345678
Across
  1. 2. / Tool is often used to help create and store complex passwords.
  2. 3. / Most commonly targeted entity of cyber attacks in an organization.
  3. 6. / A type of cyber attack that tricks users into giving up personal information.
  4. 7. / Who should you report a suspicious email to?
  5. 8. / The person or department you should approach with documented security concerns.
Down
  1. 1. / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
  2. 4. / What should you use as a way to have multiple forms of authentication on your accounts?
  3. 5. / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.