Type
Crossword
Description

What is the team name LaFamilia
The quote of the day was from what famous person Albert Einstein
What is the month Alorica will be closing March
What is the last name of the Team Lead in ICA Rosado
Which coach has a departure date for February 9th Pierce
Where can the agent see their work schedule Verint
What is the hightest score on a quality survey Five
What agent received recognition for a 5 Survey this month Hernanzed
The Internal Resource Information System is know as . . . IRIS
An Exception Request Notification is known as . . . ERN
What tab in ECM would you find the Initial Callback box Ownership
When an CEC Email is sent the required documentation is done where Text Posts
In CEC you can send a related email by creating a . . . Child Case
You can track a package in what system ETT
When sending information in the ERN Screen you must also create F9 Comments

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

HIPAA Crossword

Type
Crossword
Description

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Email Basics Crossword

Type
Crossword
Description

List of names and e-mail addresses, created and stored by a user. Also called contacts folder. Address Book
Allows you to email two or more people without anyone being able to see the person who was the included in the sent email. It protects the identity/email address of all parties to the email. Blind Carbon Copy
Sends a message to additional recipients. All parties can see who is receiving the message. Carbon Copy
Send an exact copy of the e-mail to another person. The original sender of the message may not be aware that the message is being sent to another party Forward
Send an e-mail in response to an e-mail you have received. Reply
Send an e-mail to a group of people in response to an e-mail you have received. Reply to All
A heading at the top of an e-mail that identifies what the e-mail is about. Subject
A file added to an e-mail and sent along with it. Attachment
A group of email addresses saved to make it easier to send a message to everyone in the group via the group name. Mailing List
Abbreviation for Blind Carbon Copy BCC
Abbreviation for Carbon Copy CC
An email that has been started but not sent. Draft
A folder that houses deleted emails and cleans itself out every 30 days. Trash
A type of email pretending to be from a bank or trusted source in order to steal your personal information. Might be an offer saying free tickets, or collect your winnings. Phishing
Another word for Spam Mail Junk

Computer Crime Crossword

Type
Crossword
Description

What stops people from illegally distributing and copying material? Copyright
what software is designed to disrupt, damage, or gain authorised access to a computer system? Malware
what program is designed to breach the security of a computer system? TrojanHorse
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film? Virus
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you Fraud
when someone sends emails posing as a company asking for personal information Phishing
messages from crooks trying to steal your money or your identity EMAILSCAM
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox. SPAMFILTER
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying
when someone or a robot gets into your device and steals personal information like pictures and bank details Hacking
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites. Vandalism

Information Management Crossword

Type
Crossword
Description

IR needs to comply with _____ to create, manage and maintain our information properly. PublicRecordsAct
2 - Sharing documents using ______ rather than attaching them to emails makes it easy for you and your colleagues to work collaboratively. hyperlinks
All documents of _____ value such as an email about a change of meeting room or expired diaries need to be deleted after they are no longer needed. shortterm
_____ information is important because a serious information incident may cause a reputational damage to IR. Protecting
We take a ______ (3 words) view when we collect, use and share information. wholeofIR
We apply information to help us become a ___-class revenue organisation recognised for service and excellence. world
7 - We need to capture our knowledge in IR’s shared system so that we and our colleagues can ____ it in the future. reuse
You can safely ______ documents that do not record, or provide context to, business transactions, decisions or approvals after they are no longer required. delete
To insert a hyperlink, you highlight the text that you want to turn into hyperlink and press ____. CTRLK
Where possible, documents at IR should be ____ by default so that our information and knowledge is accessible to all staff. open
IR staff or external contracts need to retain their _____ at the start, during and at the end of their work at IR. knowledge
Everyone working in IR, including employees and external consultants need to save, store and shared their knowledge according to Knowledge ____ Guideline. Retention
Knowledge is whatever you ____ and discover in your job, such as working processes or best practices. learn
Information is managed as a ______ (2words) at IR so that we can leverage it to raise the level of service to our customers. strategicasset
\Your business units should follow a consistent _____ (2 words) so that we’ll all be able to easily find and retrieve the files we want. namingconvention
Disposal ____ sets out how long we need to keep different types of public records and how we are allowed to dispose of them after that time. schedule
You need to store ____ (2 words) documents in correct locations in M: Drive so that you and your colleagues can easily find and reuse the documents. workrelated
____ (2 words) are all information IR creates, receives and maintains during the conduct of its business, irrespective of format (electronic, paper, social media, etc). Publicrecords
If you have any question about information management, you can email the information management team via Ask__@IRD.govt.nz. IM
We share and receive information with external parties to add ____. value
____ of us have a role in managing information. All
You need to ____ with the Information Management team before disposing of any public record. check
The IM guides are there to help you how to ____ information. save
The IM guides are there to help you how to _____ information. store
The IM guides are there to help you how to ____ information. share
The IM guides are there to help you how to ____ of information. dispose

Student Professionalism Crossword

Type
Crossword
Description

Being focused on the purpose of your email request. Concise
Acknowledges receipt of email and understanding of communicated knowledge. Reply
This helps the recipient identify and catalog your email. Subjectline
A much more effective alternative to a demand? Request
Who are you? Name
Closes your email and should be customized to include all necessary contact and identifying information. Signature
This is the official avenue of communication from Truman. Trumanemail
Dr., Professor, Mr., Mrs., Ms., Sir, Ma'am. Preferredtitle
Avoid this by not asking information already previously communicated. Redundancy
Include this in the body of your email. Relevantinformation
Denotes the start of a new sentence and should be used sparingly. Capitalization
What should you run before sending your email? Spellcheck
What should every email communication begin with? Introduction
This is required while waiting for a response. Patience
Do not assume this with your email recipient. Familiarity
Indicates the correct reading of your writing and conveys tone of sentence. Punctuation
This helps us identify you as a Truman Student. BannerID
The necessary tone of your email. Professional
Thank You, Respectfully, Best Wishes, Sincerely. Closing
Email is not the same as... Texting

Digital Citizenship crossword

Type
Crossword
Description

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

National Cyber Security Awareness Month Crossword

Type
Crossword
Description

CHI Chief Information Security Officer sherylrose
Month of National Cyber Security Awareness Month October
Minimum password length (characters) per CHI security standards eight
Type of software intended to damage or disable computers or systems malware
CHI Information Security website on Inside CHI chisecure
Process of converting information or data into a code to prevent unauthorized access encryption
Report suspicious email to ______________@catholichealth.net spam
Where to perform self-service password resets and unlocks chieasyaccess
Never leave computers _________________________ unless the screen is locked or logged off. unattended
What is CHI's 2-Factor authentication program? secureremoteaccess
How do you encrypt email at CHI? #secure#
The act of sending fraudulent emails. phishing