Across
- 1. Attacks Continue to be one of the most security challenges we all face in.
- 7. An important component of the TR experience and the technology we use every day.
- 8. One of the common phishing techniques used.
- 10. Most common method of receiving spam alert
- 12. well-crafted phishing emails that are replicated to seem believable.
- 13. We must use this option whenever we receive a suspicious email.
Down
- 2. Cybercriminals often resort to this to cheat employees in an organization
- 3. Keeping information secure.
- 4. intelligently pre-sorts your email so you can focus on what matters
- 5. TR’s Subject Prefix to spot a phishing e-mail.
- 6. We can Identify phishing mail by checking this parameter
- 9. source of the emails.
- 11. Good mnemonic to guide you in deciphering good emails from external sources.
