Across
- 6. TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
- 8. Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
- 10. What malware propagates without a host program?
- 11. Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
- 13. A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
- 14. What does the A in CAP stand for?
- 16. What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
- 18. What malware encrypts files and demands money for the decryption key?
- 19. This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
- 1. What is the last name of the TIAA Bank CISO?
- 2. A good way to secure your devices at home is by regularly _______
- 3. What type of attack do patches not prevent against?
- 4. The probability of exposure or loss of assets is considered what?
- 5. What type of information is private and identifies people?
- 7. What technology allows information sent over the internet to remain private or confidential?
- 9. What do most modern websites use to provide encryption?
- 12. Which industry is most targeted by social engineers?
- 15. Multifactor _____ adds extra layers of security when logging in.
- 17. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.