My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Information Security Training

BSA/Compliance Officer: Patrice Nye-Maillard
Horizontales
You are typically required to change these every 30, 60, or 90 days and are not to share them with anyone (including IT personnel)
If someone calls you to say that you’ve won a huge sweepstakes that you never entered, it’s probably a
One of the reasons why seniors are targeted for fraud is that they are
ACH, ATM, Cash, Check, Wire and mortgages are all examples of bank specific means of committing fraudulent activity, and are considered
When a trusted person such as a family member or friend uses your relationship to gain access to your personal information in order defraud you, it is called
Potentially suspicious activity that may Indicate identity theft and/ or money Laundering
are designed to protect personally identifiable information such as customer account numbers, PIN’s and Social Security Numbers
The practice of obtaining confidential information by the impersonation of a affiliated vendor or business to an organization’s employees is called
When a criminal uses your personal information, such as your Social Security number, to open credit card accounts, it is called
A Denial of Service (DoS) or Distributed Denial of Service (DDoS) is an attempt to make a machine or network resource unavailable to its intended users. This is considered a
Verticales
A term used for e-mails that claim to be from your bank, a reputable business or government agency requesting personal identifying information
The act of stealing personal information from your credit card, typically from an ATM, is known as
When there is suspect transactional activity, of which there is no reasonable explanation, what form should be forwarded to the BSA Officer
If a customer reports an instance of Identity Theft, this form should be completed and forwarded to the BSA Officer
The process of erasing details from checks to allow them to be re-written, is called
The act of always protecting sensitive or private information from unwarranted access in your work area is required by the Association’s
You should always do this to your documents and credit card applications to prevent dumpster divers from stealing your personal information