Beware, Become Cyber Aware!

12345
Across
  1. 3. To imitate a legitimate sender’s address in order to trick you.
  2. 5. The practice of protecting systems, networks, and data from digital threats.
Down
  1. 1. To imitate a legitimate sender's email address in order to trick the recipient
  2. 2. What you should do via a different communication channel when in doubt about a suspicious email
  3. 4. ___________, Don't Delete: Best option for handling suspicious emails