FY2025 Cyber Security Training

1234567891011121314
Across
  1. 4. Don't click without _____.
  2. 5. The number of principles the GDPR requires companies to adhere to.
  3. 10. A piece of evidence a user must produce to verify they are an account’s true owner.
  4. 11. BEC means Business ____ Compromise.
  5. 13. On average Parker blocks 32 ____ attempts to access Parker Networks.
  6. 14. _____, unique passwords are best practice.
Down
  1. 1. This is voice phishing.
  2. 2. This is something you are, including fingerprints or facial recognition.
  3. 3. _____ Data means any data relating to a living individual who is or can be identified from the data itself.
  4. 6. Before leaving your workstation, you should always do this to the area.
  5. 7. Text message phishing.
  6. 8. Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
  7. 9. CEO fraud is one of the most common forms of this.
  8. 12. Designed to damage devices or exploit them for sensitive information and access.