Across
- 3. a set of numbers used to unlock a phone.
- 5. a phishing attempt directed at a leader of an organisation.
- 6. hackers often attempt to seal this from your computer or external storage.
- 8. a 14-character phrase to secure an account.
- 10. the button in Outlook to declare a phish email.
- 11. What is the acronym for artificial intelligence.
- 13. when a criminal follows behind you when entering a secure building.
- 14. turn on when working on a work device out of office.
Down
- 1. software used to blackmail targets for money.
- 2. software installed to spy on your device.
- 4. never click suspicious _____ in emails.
- 7. what action should you take when you leave your work computer?
- 8. a fake email used to trick the receiver.
- 9. phishing that targets one specific person.
- 12. sensitive emails must be sent with correct ___?
