People, Policies & Phishing: HR Security Puzzle

12345678910111213
Across
  1. 2. Training employees to recognize threats
  2. 8. Rule about how employees should create and manage credentials
  3. 10. Fake emails pretending to be job offers or HR messages
  4. 11. Manipulating people to break security rules
  5. 12. Laws protecting employee records
  6. 13. Two-factor or biometric _______ protects HR portals
Down
  1. 1. HR system often targeted by attackers because it stores payroll & tax data
  2. 3. HR must quickly disable these when an employee leaves
  3. 4. Proof of who someone is — crucial in HR systems
  4. 5. Risk from disgruntled or careless employees
  5. 6. Cybercrime that locks HR/payroll files until ransom is paid
  6. 7. GDPR, HIPAA, and CCPA are examples of ______ requirements
  7. 8. Common onboarding document that can carry malware if opened
  8. 9. Criminal act of stealing employee identities for tax or benefits fraud