Across
- 2. If you get a phishing email, you should ______ it to IT or Cybersecurity.
- 4. _______ is a form of social engineering where criminals pretend to be legitimate entities and try to trick you into revealing sensitive information or installing malware on your computer by clicking a malicious link.
- 6. A phishing scam that uses a phone or a voice message.
- 8. Never _______ on a suspicious link or attachment in an email, text, or website.
- 9. When an attacker pretends to be a legitimate person or organization and deliberately hides who they really are.
- 10. Do not _______ to a suspected phishing email or text message.
Down
- 1. This is a targeted or personalized phishing attack that uses specific information about you or your company to make their attack seem more believable.
- 3. A phishing attack that uses text messages is called ________.
- 5. Criminals and ________ will often use phishing to steal from their victims.
- 7. One give away that an email is phishing is that they use poor ______ in their sentences.