Across
- 2. Training employees to recognize threats
- 8. Rule about how employees should create and manage credentials
- 10. Fake emails pretending to be job offers or HR messages
- 11. Manipulating people to break security rules
- 12. Laws protecting employee records
- 13. Two-factor or biometric _______ protects HR portals
Down
- 1. HR system often targeted by attackers because it stores payroll & tax data
- 3. HR must quickly disable these when an employee leaves
- 4. Proof of who someone is — crucial in HR systems
- 5. Risk from disgruntled or careless employees
- 6. Cybercrime that locks HR/payroll files until ransom is paid
- 7. GDPR, HIPAA, and CCPA are examples of ______ requirements
- 8. Common onboarding document that can carry malware if opened
- 9. Criminal act of stealing employee identities for tax or benefits fraud
