Across
- 2. _______ your data regularly and periodically check that you are able to restore them.
- 4. Do not provide your _______ email account to social networks.
- 6. _______ your computer when left unattended.
- 7. This can slow down your computer and watch everywhere you go on the Internet.
- 10. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- 12. Always use _______ factor authentication where available.
- 13. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- 14. Use a _______ password different from the passwords you use to access other sites.
Down
- 1. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- 3. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- 5. You should always keep your software and anti-virus definitions up-to-_______.
- 8. Cybersecurity is _______'s responsibility.
- 9. Information Security is a _______ issue.
- 11. This horse can stampede your security defences for the bad guys and make you look sheepish too!
- 12. _______ before you click or forward.