Let’s phish!

12345678910
Across
  1. 2. If you get a phishing email, you should ______ it to IT or Cybersecurity.
  2. 4. _______ is a form of social engineering where criminals pretend to be legitimate entities and try to trick you into revealing sensitive information or installing malware on your computer by clicking a malicious link.
  3. 6. A phishing scam that uses a phone or a voice message.
  4. 8. Never _______ on a suspicious link or attachment in an email, text, or website.
  5. 9. When an attacker pretends to be a legitimate person or organization and deliberately hides who they really are.
  6. 10. Do not _______ to a suspected phishing email or text message.
Down
  1. 1. This is a targeted or personalized phishing attack that uses specific information about you or your company to make their attack seem more believable.
  2. 3. A phishing attack that uses text messages is called ________.
  3. 5. Criminals and ________ will often use phishing to steal from their victims.
  4. 7. One give away that an email is phishing is that they use poor ______ in their sentences.