Cyber Insurance & IT

123456789
Across
  1. 2. Fraudulent emails attempting to steal sensitive information.
  2. 4. Malicious software that holds digital files hostage for payment.
  3. 6. Requests made for compensation after a covered cyber event.
  4. 7. A circumstance or loss not covered by an insurance policy.
  5. 8. Type of authentication that requires more than a password.
  6. 9. The process of evaluating cyber risks for insurance coverage.
Down
  1. 1. An addition or amendment made to a cyber insurance policy.
  2. 2. The amount paid regularly to maintain an insurance policy.
  3. 3. Insurance purchased by insurers to limit exposure to major losses.
  4. 5. Legal responsibility for data breaches or cyber incidents.