Risky Clues

12345678910111213141516171819
Across
  1. 2. A voice-based scam technique
  2. 7. Use a ______ password to protect your accounts
  3. 8. Latest wireless security protocol for networks
  4. 10. Avoid using this kind of free network in public places
  5. 12. An internal framework that shapes the administration of an organisation
  6. 13. Leakage Unauthorised exposure of sensitive information
  7. 14. Risk Umbrella term for various threats for an organisation
  8. 16. Risk Risk due to obligations or failures in external agreements
  9. 19. Media Avoid these websites on official devices
Down
  1. 1. A calculated step to soften the blow of what might go wrong
  2. 3. Regulation that governs how personal information is stored.
  3. 4. Always lock your system when you leave it
  4. 5. If you find yourself in cyber threat, call me
  5. 6. System or process failing to work as intended
  6. 9. A type of cyberattack using fake emails
  7. 11. Intentional deception for personal or financial gain
  8. 13. Security Protect this sensitive information of clients
  9. 15. Known exposure despite controls
  10. 17. Register Structured risk documentation tool
  11. 18. Controls Tools used to prevent confidential info from leaving the system