Across
- 1. Downloaded software that holds data hostage
- 4. ____ sensitive data sent outside of the company
- 6. Can expose sensitive data to identity theft
- 7. Cybersecurity Framework
- 8. Fake emails that appear to be from a verified internal source
Down
- 2. Requires Additional Steps beyond legging in with a password
- 3. When to disconnect devices infected by ransomware
- 5. Type of email containing links, usually appears to be from someone you know