Across
- 4. Don't click without _____.
- 5. The number of principles the GDPR requires companies to adhere to.
- 10. A piece of evidence a user must produce to verify they are an account’s true owner.
- 11. BEC means Business ____ Compromise.
- 13. On average Parker blocks 32 ____ attempts to access Parker Networks.
- 14. _____, unique passwords are best practice.
Down
- 1. This is voice phishing.
- 2. This is something you are, including fingerprints or facial recognition.
- 3. _____ Data means any data relating to a living individual who is or can be identified from the data itself.
- 6. Before leaving your workstation, you should always do this to the area.
- 7. Text message phishing.
- 8. Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
- 9. CEO fraud is one of the most common forms of this.
- 12. Designed to damage devices or exploit them for sensitive information and access.
