Cybersecurity

12345678
Across
  1. 1. Downloaded software that holds data hostage
  2. 4. ____ sensitive data sent outside of the company
  3. 6. Can expose sensitive data to identity theft
  4. 7. Cybersecurity Framework
  5. 8. Fake emails that appear to be from a verified internal source
Down
  1. 2. Requires Additional Steps beyond legging in with a password
  2. 3. When to disconnect devices infected by ransomware
  3. 5. Type of email containing links, usually appears to be from someone you know