Across
- 4. Scammers use ______ tactics to try to get a fast response.
- 5. If you suspect a link or attachment may be suspicious, _______ download it.
- 8. A good password is __________ for you, but difficult for others to guess.
- 12. If you believe you've clicked a bad link, notify _____ immediately.
- 13. Malware is most likely to enter an organization through __________.
- 15. Never ____________ old passwords.
- 16. Malicious links disguised as legitimate messages.
- 18. Be wary of ______________ attachments.
Down
- 1. Each should be unique and complicated.
- 2. Our e-mail security system is called __________.
- 3. Scams can come through e-mail,_______, phone call, or even in person.
- 6. No platform is ________ to breaches.
- 7. Using a work device for _________ use increases the risk of a cyber threat.
- 9. Two-factor __________ protects your account by requiring a second identity verification.
- 10. Don't use obvious __________ changes like substituting a number for a letter.
- 11. Passwords should never be __________ with anyone.
- 12. If you feel you have fallen prey to a scammer, notify CHN or ___________.
- 14. 65% of people _________ passwords.
- 17. 80% of breaches are related to stolen or ________ passwords.