Across
- 4. Extortion software
- 6. Your Yubikey's MFA factor
- 8. Encryption ransomware
- 10. Before leaving your computer, you should ___
- 11. The M in MFA
- 12. Update devices regularly to get these
- 14. Infosec awareness month
- 15. Use when handling sensitive data
- 16. SOC report for a given moment in time
- 17. When to share passwords with IT staff
- 18. Phishing for the mobile age
- 19. Matrix to check before granting permissions
Down
- 1. SOC's latest SSAE version
- 2. Minimum Dwolla password length
- 3. Our approved password manager system
- 4. Birthdays, credit card numbers, and bank info are ___
- 5. A trust services criteria
- 7. ___ of duties
- 9. Another word for inherence factor
- 13. Certification for issuing SOC reports
