Across
- 4. What is recommended to use instead of a password for better security?
- 6. What term describes nearly flawless simulations of people and voices created by scammers?
- 9. What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
- 1. What button in Outlook helps report suspicious emails?
- 2. During which month is Cybersecurity Awareness Month celebrated?
- 3. What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
- 5. What type of authentication is abbreviated as MFA?
- 7. What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
- 8. How many minutes can it take for hackers to discover a six-character password?
- 10. What is the name of the company-approved, secure password manager mentioned?