CSAM Crossword 1

123456789101112131415
Across
  1. 1. Acceptable Use policies often cover bring-your-own-device (or _____) rules as well.
  2. 3. One way to avoid suspicious popups in your web browser is through the use of a popup _____.
  3. 5. When it comes to communications made in your name, only _____ are accountable.
  4. 8. any software designed by cybercriminals to harm or exploit a device or network is called:
  5. 10. Organizations can monitor your email and _____ while at work.
  6. 11. You should never leave fresh documents unattended at the _____.
  7. 14. One of the most common ways to get users to click on bad links is through _____ windows.
  8. 15. If you find documents at the printer containing sensitive information, you should shred the documents and _____ the incident.
Down
  1. 1. When posting pictures to social media, make sure no sensitive information can be seen in the _____
  2. 2. make sure to follow all organizational _____ when reporting suspicious behavior
  3. 4. You should never _____ links that you don't recognize; this applies to personal and professional settings.
  4. 6. The quickest way to verify if an email from a coworker is phishing, is to _____ the coworker on the phone and confirm the details of the email.
  5. 7. When you give an app permission to access your social media profile, it can attain any of the _____ you share.
  6. 9. Personal devices can be used for work only if it complies with the _____ use policy.
  7. 11. Never share sensitive, personal, or organizational information over _____ wifi networks.
  8. 12. One of the best cybersecurity practices for making a new password is to never _____ old passwords
  9. 13. if you receive an email that you suspect to be fishing, you should notify your IT _____ department