example

12345678910111213141516171819
Across
  1. 2. A “tunnel” for private network browsing:
  2. 4. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
  3. 5. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
  4. 8. What malware propagates without a host program?
  5. 10. A _____ review is done quarterly to review privileged access.
  6. 11. What is the most common attack vector for malware?
  7. 13. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
  8. 14. A targeted form of phishing that is customized for specific individuals within a specific organization.
  9. 17. What does GCSAM stand for?
  10. 19. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
  1. 1. Who founded TIAA?
  2. 3. Malware that limits users access until a ransom is paid.
  3. 6. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
  4. 7. Who is the security awareness program’s mascot?
  5. 9. What is TIAA’s social impact hashtag?
  6. 12. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
  7. 15. When somebody sends an e-mail with a link to a bogus website it is called:
  8. 16. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
  9. 18. The probability of exposure or loss of assets is considered?