Across
- 2. A software installed on your computer that's used to keep intruders out.
- 3. The _____ Man is an award winning security awareness series on KnowBe4.
- 4. Virtual Private network
- 7. A Data ____ is when a hacker successfully attacks a business, gaining control of it's network.
- 8. If your computer gets this, it could change, corrupt, or destroy information.
Down
- 1. Two-factor _________ is an extra layer of protection used to ensure the security of online accounts..
- 5. Wi-Fi Access points that allow users to connect to the internet while away from home. Can be vulnerable to threats.
- 6. A scam where a hacker poses as a legitimate business or organization in order to fool someone into giving over their personal information.
- 9. A name commonly given to unsolicited emails