Phishing for Madness

123456789101112131415
Across
  1. 4. Malicious software designed to block access to a computer system until a sum of money is paid.
  2. 7. A phishing email that is from a trusted sender/business
  3. 9. A tactic bad actors use to manipulate people to give up confidential/personal information. Note: fill in as one word.
  4. 10. This is a type of scam in which a bad actor is disguised as a trusted source to gain access to important data or information.
  5. 11. Stop. Call. Verify. Are best practices to prevent _______. Note: fill in as one word.
  6. 12. This is a type of assessment the Information Security team conducts to educate associates on what to look for in malicious emails.
  7. 14. This attack is accomplished through a voice call.
  8. 15. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. 1. This authentication method requires the user to provide two or more verification factors to access an account or platform. Note: fill in as one word.
  2. 2. This type of phishing targets a specific group or type of individual such as a company’s system administrator.
  3. 3. A ____________ is a sentence-like string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
  4. 5. This type of phishing is an attack that uses text messaging or short message service (SMS) to execute the attack.
  5. 6. This phishing is an even more targeted type of phishing that goes after the whales – a marine animal even bigger than a fish. These attacks typically target a CEO, CFO, or any CXX within an industry or a specific business.
  6. 8. The team at Baird that provides security and awareness training and content to our associates. Note: fill in as one word.
  7. 9. Name of the team that associates should notify if a mobile device containing Baird data is lost, stolen or compromised. Note: fill in as one word.
  8. 13. _____ _____ is a trail of data you create while using the Internet which includes shopping, financial, health and fitness, and social data. Note: fill in as one word.