Phishing 101

123456789101112131415161718
Across
  1. 4. Compromises computer and files
  2. 5. Familiar ___ are often faked by scammers
  3. 6. Malicious email attack
  4. 8. Who do you report suspicious email to?
  5. 9. Where to find additional information on the different types of (phishing)
  6. 10. Imposter website
  7. 13. Forgery, misdirection and lying are methods of
  8. 16. Sense danger?
  9. 17. Before you open or download an attachment
  10. 18. "Think Before You ___"
Down
  1. 1. A stranger in a dark alley is much like a _____ in your inbox.
  2. 2. Looks real, but is infected with malware
  3. 3. "Too good to be true"
  4. 5. Never send these via email
  5. 7. This can be damaged by falling for a (phish) at work
  6. 11. Falling for a (phish) in your ___ life could result in money stolen from your bank account
  7. 12. Exposes business secrets and confidential data
  8. 14. Who should learn how to recognize and avoid (phishing)?
  9. 15. Security Awareness ____ can help you identify the warning signs of (phishing)