Cyber Cross Word (Phishing)

123456789101112131415
Across
  1. 2. One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
  2. 5. If you suspect a Phishing attempt, you can ______ it.
  3. 8. To report a Phishing attempt, email ______________ or use the "report spam" button.
  4. 11. A form of Phishing that uses texting platforms.
  5. 12. When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
  6. 13. Cybercriminals may get your information from ________ available sources.
  7. 15. Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
  1. 1. Once have reported and blocked the sender, what should you do with the email?
  2. 3. Phishing attempts via direct message on social media or a phone call is called _______.
  3. 4. Occurs when criminals try to get you to open harmful links, emails or attachments.
  4. 6. This form of contact is the usual form of Phishing.
  5. 7. Communications trying to trick you commonly look like they are from someone _______.
  6. 9. In some cases, a Phishing attempt can be ________ to your information.
  7. 10. To handle Phishing attempts properly, its best to think before you _____.
  8. 14. After reporting, you should _____ the sender.