Across
- 5. Always _____ your computer when you leave your desk
- 6. Many companies are moving their data to this
- 10. Tool to protect computers from malware
- 15. To protect your sensitive information, avoid sending it via _____
- 17. For extra security, always enable ___ ______ authentication
- 18. A fake email designed to steal your credentials
- 19. Internet browser mode for more privacy
- 20. Never _____ a password
- 22. Aon wrote its first ____ policy 20 years ago
- 23. A kind of bounty
- 24. Data ____ is when an attacker steals and takes data from a company
- 26. ACS service line that conducts background style research and due diligence
- 27. Criminals may physically place this on a credit card reader to steal the card information
- 28. ACS service line that processes and analyzes data, often as part of litigation
- 29. The process of encoding information
- 31. Something you have too many of
- 32. A "bandaid" for software, often released on Tuesdays by Microsoft
Down
- 1. A type of digital currency
- 2. ACS service line that connects clients with insurance carriers
- 3. Cyber Solutions CEO
- 4. ACS service line that provides security recommendations
- 7. Generic term for a security incident
- 8. Sophisticated attack group, for short - often a nation state
- 9. ACS service line that investigates cyber incidents
- 10. What does ACS stand for?
- 11. Internet of Things, or ______ devices
- 12. A special browser to access the dark web
- 13. Malware that encrypts files and demands a payment to restore them
- 14. Former Assistant US Attorney for the Eastern District of New York
- 16. ACS service line that tracks and gathers information about threat actors and other people of intereset
- 17. ACS service line that tries to break into client systems
- 21. Report suspicious emails to this Aon security group
- 25. Cyber Security Awareness Month
- 27. Former head of FBI's computer crime squad
- 30. Canadian colleagues that joined ACS in 2020
