Across
- 1. tells other servers which servers are allowed to send emails using your business’s domain name
- 5. protection from data theft
- 7. a data copy of files
- 9. an text encryption used to protect data
- 11. email authentication technology to help prevent phishing emails
- 12. getting email that asks that they have your data
- 13. a way of stealing data usually by emails or phone calls
- 15. the service you choose should include TLS, which will help to protect your customers’ privacy.
- 16. puts a digital signature on outgoing mail
- 17. Accessing that another device safely
- 18. People who help you with technological issues.
Down
- 1. Something which can be exploited by hackers
- 2. that automatically download malicious software onto your computer.
- 3. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
- 4. Someone else using your identity
- 6. a file or code that infects or steal data
- 8. a new version of data of the system
- 10. Usually comes from malware in the system
- 14. the process or action of verifying the identity of a user or process.
- 16. Information that was stolen