Across
- 3. Stay _____ and be on the lookout for security threats or incidents.
- 8. An email scam that that targets unsuspecting users to give up information.
- 11. Measures taken to protect your or your organization's information from cyber attack
- 13. Never write these down on a sticky note or a whiteboard.
Down
- 1. An unauthorized person that tries to gain access to your computer.
- 2. Never open these in email unless you already expected them from the sender.
- 4. _____ is a level of data classification.
- 5. _____ is when an unauthorized person follows you into a secure location.
- 6. Lock your _____ and your mobile phone anytime they are not in use.
- 7. Report all possible cyber _____ to the IT Service Desk.
- 9. Files with sensitive information should always be kept in a _____ file room or drawer.
- 10. Always keep a _____ workspace that is free of confidential information.
- 12. Alway install updates to your computer or mobile phone. Don't click "Remind me later."