Across
- 3. Check your texts closely
- 6. Verifying Identity
- 8. Your computer is sick
- 10. Longer is Stronger
- 12. Not the kind from the ocean
- 14. Interconnected web of computers
- 15. Cyber vigilance
- 16. Scrambled for security
- 18. Virtual storage in the sky
- 19. Your data is stolen
- 23. An SMS text phish
- 24. What you should do when you suspect a phish
- 26. AI-generated deception
- 27. DTCC password manager
- 28. DTCC Technology launching in July
Down
- 1. Voice trickery that sounds fishy
- 2. A malicious QR Code
- 4. Retina scans and fingerprints
- 5. Don't use unsecured public ______
- 7. Spyware-ransomware-viruses
- 9. Malicious software holding data hostage
- 11. Wears a black hat
- 13. The new DTCC MFA process
- 16. Triggers to make you click
- 17. A fence provides this
- 18. You entered your login info in a fake site
- 20. What you should do with all links
- 21. Blocks malicious connections
- 22. Used to be called SATEC
- 25. Last name of our CISO
