Across
- 3. The place to go to learn about emerging cybersecurity threats
- 4. Software designed with malicious intent
- 5. An email designed to get you to take an action, like download a file, open an attachment or click a link
- 6. These help identify you protect information and should be created to be strong, complex and unique
Down
- 1. Where to forward suspicious emails
- 2. Software Social engineering technique that realistically mimics a person’s voice in fake videos and phone calls
