Beware, Become Cyber Aware!
Across
- 3. To imitate a legitimate sender’s address in order to trick you.
- 5. The practice of protecting systems, networks, and data from digital threats.
Down
- 1. To imitate a legitimate sender's email address in order to trick the recipient
- 2. What you should do via a different communication channel when in doubt about a suspicious email
- 4. ___________, Don't Delete: Best option for handling suspicious emails