Across
- 1. What is the team in PwC that looks after cyber security?
- 5. What type of cyberattack where scammers trick individuals into scanning fake QR codes?
- 7. What is the process of converting data into a code to protect it from unauthorized access?
- 9. What is the name of the VPN PwC employees should use?
Down
- 2. What is the attack type of scamming via text message called?
- 3. What is the attack type directed at high-level executives where attackers pretend as legitimate, known and trusted entities, known as?
- 4. What is the protective layer between a network and potential threats?
- 6. What is the name of the review PwC employees should raise if they want to use a new tool or application?
- 8. Which term describes software designed to damage or disrupt systems?
