Cybersecurity Awareness Month 2025 Week 1

12345678910111213141516
Across
  1. 1. your device can be infected with this bad software
  2. 4. this is a type of phishing but relates to messages sent via SMS
  3. 5. Bad actors usually add this to an email in order to get you to click on it and infect your device
  4. 8. this should be used to log in to you account and should not be shared with anyone.
  5. 10. this is found usually an the form of image or file that is sent with an email
  6. 11. this is a way of locking files in your electronic device in order for others not to access it
  7. 12. your device can be infected with this software that is used to spy on you
  8. 14. the end of an email address usually found after the @ symbol
  9. 15. this can be used to store information and transfer it from one device to another
  10. 16. a weakness in any system
Down
  1. 2. your device can be infected with this. it locks your files and the bad actor will ask for a payment in order to unlock it.
  2. 3. you should contact this team whenever you receive a suspicious email
  3. 6. you need to conduct these so that your device is properly protected from the latest threats
  4. 7. the name of this operating system can also be used to describe a feature of a building
  5. 9. This software is used to protect your electronic device from possible infections
  6. 13. Bad actors send these emails or messages pretending to be a reputable source