Cybersecurity Awareness

123456789
Across
  1. 1. Fraudulent attempt to obtain sensitive information via email.
  2. 2. A type of malicious software that locks files and demands payment.
  3. 5. When employees unknowingly help hackers, it's called an ___ threat.
  4. 8. Regularly updating this can patch security vulnerabilities.
  5. 9. Security appliance that limits access to data or systems.
Down
  1. 1. A secret word or phrase used to gain access to a system.
  2. 3. Portable devices like USBs can carry this kind of malicious code.
  3. 4. A common workplace policy: "Don't write your password on a ___."
  4. 6. Two-step process to verify identity.
  5. 7. You should never connect to public ___ without using a VPN.