Across
- 5. Where the encryption keyword must be placed
- 10. Attack technique where the sender pretends to be someone you trust
- 11. Regulation that requires protection of patient information
- 13. Protected Health Information that must be safeguarded
- 15. Something that deviates from typical email behavior
- 16. Beginning of the legitimate URL used for encrypted email messages
- 17. Manipulation tactic used to trick users rather than exploit technology
- 18. Automated handling step that helps analyze reported suspicious emails
Down
- 1. Type of AI approach that focuses on how people normally communicate
- 2. Legitimate but unwanted email that can be filtered out of your inbox
- 3. Email encryption service used to protect sensitive information
- 4. The action taken after a malicious email is identified
- 6. A recipient outside the organization that triggers encryption requirements
- 7. Keyword added to the subject line to send a secure email
- 8. Common email-based attack that tries to steal information or credentials
- 9. Email security platform that learns normal communication patterns to detect unusual messages
- 12. Secure location where recipients may view encrypted messages
- 14. The “normal” reference point used to spot suspicious email activity
