Across
- 6. What to do when walking a visitor through secure areas
- 8. A dishonest scheme or trick
- 9. Malicious software that locks files until money is paid
- 10. Type of information that must be carefully guarded
- 11. What you should do with a suspicious email
- 13. Fraudulent emails that trick people into revealing personal info
- 14. – What you should do to your workstation when you leave your desk
Down
- 1. A secret code used to access systems or accounts
- 2. Software patches that fix bugs and security flaws
- 3. Malicious code that spreads from one computer to another
- 4. Software that secretly collects your information
- 5. Worn to identify you as an employee
- 7. Watching over somebody's shoulder to see what they are typing
- 12. What good security habits do for your data
