Trick or Threat: The Cyber Crossword

123456789101112131415161718192021
Across
  1. 2. The IT Team's critical tasks include keeping all software and systems _____
  2. 4. An Incident Response Plan explains exactly what to do during a ____ attack
  3. 5. With cloud systems, professional teams manage ____ 24/7
  4. 6. Examples of cloud systems include ____ workspace and Microsoft 365
  5. 11. MFA stands for _____ Authentication: Your digital shield
  6. 14. The IT Team's critical tasks include enforcing multifactor ___
  7. 15. Cyber threats can harm businesses of all _____
  8. 17. MFA is like having multiple ____ on your digital door
  9. 19. ____ and ipads are great examples of secure devices
  10. 20. A Cybersecurity ___ plan should include talking about security with your team, using multifactor authentication,keeping software updated, creating a response plan, and never stopping learning about digital saferty
  11. 21. The CEO's Role in Cybersecurity includes making cybersecurity a normal part of _____ work
Down
  1. 1. MFA can use text messages, special codes, or other _____ methods.
  2. 3. _____ is about protecting your digital information and systems
  3. 7. The ___ Response plan can be thought of as a "digital first aid kit"
  4. 8. Chromebooks and iPads have built-in ___ features
  5. 9. Some common cyber threats include ____ emails as the most common attack
  6. 10. ____ often target small businesses.
  7. 12. Staff should learn to spot suspicious ____ and emails
  8. 13. All staff needs to understand cybersecurity ____
  9. 16. ____ services are often more secure for small businesses
  10. 18. The CEO's Role in Cybersecurity includes creating a ____ where everyone cares about digital safety