Across
- 1. Necessary to ensure continuity.
- 4. Helps avoid phishing and maintain security.
- 5. Describes the identity or message in phishing.
- 6. Often disguised in phishing emails.
- 9. Essential to protect data and systems.
- 12. Crucial during disruptions for transparency.
- 13. Red flag in scam messages to pressure action.
- 15. What scammers ask victims to do to steal info.
Down
- 2. Key to avoiding phishing and ensuring business stability.
- 3. Result of falling for a scam.
- 7. System to keep business running during disruptions.
- 8. Core goal of BCMS.
- 10. Common platform used in phishing attacks.
- 11. Deceptive scheme or trick.
- 14. Fraudulent attempt to obtain sensitive information.
