CSAT Cyber Security Checkpopint
Across
- 4. What you should do with all links
- 6. Retina scans and fingerprints
- 8. Spyware, ransomware, viruses, oh my!
- 9. This authentication needs two or more things
- 10. Interconnected web of computers
- 12. Your internet viewing app
- 15. BIG catch for cyber criminals
- 17. Last thing before the first single slash in a URL
- 19. Longer is Stronger
- 22. An SMS text phish
- 24. From white to red
- 27. Voice trickery that sounds fishy!
- 30. Blocks malicious connections
- 32. A fence provides this
- 33. Not the kind from the ocean
- 34. Verifying Identity
- 35. Scrambled for security
- 38. The new DTCC MFA process
- 39. Uhoh, your data has been exposed!
- 40. DTCC password manager
Down
- 1. To whom should you report suspicious messages?
- 2. DTCC Technology launching in July
- 3. Last name of our CISO
- 5. Triggers to make you click
- 7. Records your keystrokes
- 11. Malicious software holding data hostage
- 13. What you should do when you suspect a phish
- 14. Virtual storage in the sky
- 16. Don't use unsecured public ______
- 18. Your computer is sick
- 19. Suspicious email
- 20. Wears a black hat
- 21. Cyber Security ____ Office (CSRO)
- 23. A malicious QR Code
- 25. Cyber vigilance
- 26. You entered your login info in a fake site
- 28. AI-generated deception
- 29. Check your texts closely
- 31. The world's most wanted hacker
- 36. Used to be called SATEC
- 37. Artificial or Real?