GKCU Cyber Security
Across
- 4. What emails are labeled from outside the CU
- 6. What scammers do when they send deceptive emails to trick users into clicking malicious links.
- 8. When a bad actor makes an email look like it’s from a trusted source by changing the display name or headers
- 9. One of our golden rules: “___ but Verify
- 10. Always hover over this before you click to check where it really goes.
Down
- 1. Phone call–based scams where attackers impersonate someone to get information or money.
- 2. a short verb meaning to confirm
- 3. What you often shouldn’t open without confirming the sender — it can carry malware.
- 5. The action you should take when you suspect a message is a scam.
- 7. SMS-based phishing — text messages that try to trick you into clicking a malicious link.