Security Awareness Campaign 2025

1234567891011121314151617
Across
  1. 3. phishing via sms/text messages
  2. 4. copy of data for recovery
  3. 6. browser add-ons that pose a supply chain risk
  4. 8. what should you do if you suspect a security incident?
  5. 14. malware that locks files for money
  6. 15. access rights granted to a user
  7. 16. phishing via voice/phone call
  8. 17. malicious software
Down
  1. 1. If a customer asks for security documents or compliance information, where should you direct them?
  2. 2. policy for how long data is kept
  3. 5. tool to store and generate credentials
  4. 7. virtual private network (acronym)
  5. 9. unauthorized physical entry
  6. 10. uncontrolled spread of data copies
  7. 11. records keystrokes to steal passwords
  8. 12. adherence to rules/regulations
  9. 13. social engineering via email