Across
- 1. Acceptable Use policies often cover bring-your-own-device (or _____) rules as well.
- 3. One way to avoid suspicious popups in your web browser is through the use of a popup _____.
- 5. When it comes to communications made in your name, only _____ are accountable.
- 8. any software designed by cybercriminals to harm or exploit a device or network is called:
- 10. Organizations can monitor your email and _____ while at work.
- 11. You should never leave fresh documents unattended at the _____.
- 14. One of the most common ways to get users to click on bad links is through _____ windows.
- 15. If you find documents at the printer containing sensitive information, you should shred the documents and _____ the incident.
Down
- 1. When posting pictures to social media, make sure no sensitive information can be seen in the _____
- 2. make sure to follow all organizational _____ when reporting suspicious behavior
- 4. You should never _____ links that you don't recognize; this applies to personal and professional settings.
- 6. The quickest way to verify if an email from a coworker is phishing, is to _____ the coworker on the phone and confirm the details of the email.
- 7. When you give an app permission to access your social media profile, it can attain any of the _____ you share.
- 9. Personal devices can be used for work only if it complies with the _____ use policy.
- 11. Never share sensitive, personal, or organizational information over _____ wifi networks.
- 12. One of the best cybersecurity practices for making a new password is to never _____ old passwords
- 13. if you receive an email that you suspect to be fishing, you should notify your IT _____ department