Across
- 3. Who should you reach out to when you have security-related questions?
- 6. What type of attack relies on deceiving you by pretending to be someone you know or trust?
- 9. What is the name of the tool you use to connect securely to the company network remotely?
- 11. Who is the newest member of the security team?
- 13. How often must employees reset their passwords according to policy?
- 15. What compliance standard governs how we protect payment card data?
- 16. What is the domain name of our internal emails?
- 17. What is the minimum length of our password according to policy?
Down
- 1. What do we call an email scam that tricks people into clicking malicious links?
- 2. What type of data must be protected under PCI rules?
- 4. What tool on your company laptop automatically scans for and blocks malware?
- 5. What do we call the use of multiple methods of authentication to verify identity?
- 7. What is the guest access system?
- 8. Who is the head of our SiriusXM security team?
- 10. What tool do employees use for Single Sign-On to company applications?
- 11. What should you always do if you suspect a security incident?
- 12. What kind of attack locks files until money is paid?
- 14. What should you do when you step away from your computer?
