Across
- 4. Use strong password or __________ to better protect your accounts and keep your information safe.
- 6. Software______ boost security and performance
- 8. One effective way to protect against impersonation scams, such as Business Email Compromise (BEC), is to ______ the identity of the email sender through an out-of-band channel—such as a trusted phone call—especially when financial transactions are involved.
- 9. Be mindful of your 'digital _______' when post online.
Down
- 1. Cybercriminals use AI to mimic images or videos to trick people into sharing money or personal data
- 2. One of the follow-up actions to perform for suspicious emails after clicking the "Report Phishing" button in Outlook
- 3. One of the common phishing signs.
- 4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 5. One of the tips for stronger passwords
- 7. Acronym for authentication method requiring two or more forms of verification.
