Cybersecurity Awareness

12345678910
Across
  1. 4. Always ____ your devices and software when the newest version is available
  2. 7. Always use strong, unique, and complex _____for each of your accounts.
  3. 8. Using a secured ___ is important when working onsite or remotely.
  4. 10. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip, though.
Down
  1. 1. Bad software installed on a computer to damage or harm it. Examples are viruses, Ransomware, Spyware, etc.
  2. 2. DUO is an example of ____, where a prompt is sent to your phone to verify your identity before logging into the account.
  3. 3. When a hacker impersonates a trustworthy person or organization to lure you into clicking on a suspicious link or download a file. This can be in the form of emails, text messages, and phone calls.
  4. 5. A ___ breach is when sensitive and confidential information is accessed, viewed, or stolen by unauthorized individuals or groups.
  5. 6. A method of receiving and sending messages over a network, such as the Internet
  6. 9. If you notice anything suspicious, you should ___ it to IT.Security@uchicagomedicine.org or call 773-702-3456.