The Final Puzzle

1234567891011
Across
  1. 2. An attempt to obtain sensitive information such as usernames, passwords, etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
  2. 5. When an employee gets hurt, this is considered a
  3. 7. The new safety tool that we use to input Near Miss observations
  4. 9. A tool used to carefully study and list out the safety critical portions of a job or task to deetermine hazard-mitigating actions (ie. international travel)
  5. 10. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
  6. 11. Our top priority is that Nobody Gets __________
Down
  1. 1. Make sure you set strong _________ by using upper, lowercase, numbers, and characters, and avoid dictionary words
  2. 3. Cyber attackers use emails to trick you to enable them to steal our ___________
  3. 4. An example would be a puddle of water or an electrical wire sticking out that could potentially injure a colleague
  4. 6. Malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection
  5. 7. Common messaging platform for attackers to use for phishing attacks
  6. 8. Mental checks that we perform (safety self-assessments)
  7. 10. Remember Troy's Tips - Stop, Look, Think, and ___________