Across
- 2. A “tunnel” for private network browsing:
- 4. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- 5. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- 8. What malware propagates without a host program?
- 10. A _____ review is done quarterly to review privileged access.
- 11. What is the most common attack vector for malware?
- 13. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- 14. A targeted form of phishing that is customized for specific individuals within a specific organization.
- 17. What does GCSAM stand for?
- 19. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- 1. Who founded TIAA?
- 3. Malware that limits users access until a ransom is paid.
- 6. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- 7. Who is the security awareness program’s mascot?
- 9. What is TIAA’s social impact hashtag?
- 12. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- 15. When somebody sends an e-mail with a link to a bogus website it is called:
- 16. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- 18. The probability of exposure or loss of assets is considered?