Cybersecurity Awareness
Across
- 4. Always ____ your devices and software when the newest version is available
- 7. Always use strong, unique, and complex _____for each of your accounts.
- 8. Using a secured ___ is important when working onsite or remotely.
- 10. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip, though.
Down
- 1. Bad software installed on a computer to damage or harm it. Examples are viruses, Ransomware, Spyware, etc.
- 2. DUO is an example of ____, where a prompt is sent to your phone to verify your identity before logging into the account.
- 3. When a hacker impersonates a trustworthy person or organization to lure you into clicking on a suspicious link or download a file. This can be in the form of emails, text messages, and phone calls.
- 5. A ___ breach is when sensitive and confidential information is accessed, viewed, or stolen by unauthorized individuals or groups.
- 6. A method of receiving and sending messages over a network, such as the Internet
- 9. If you notice anything suspicious, you should ___ it to IT.Security@uchicagomedicine.org or call 773-702-3456.