Across
- 2. Something you should never share with anyone (8 letters)
- 5. Small, innocent, but easily distracted by flashy phishing baits—needs to grow wiser! (5 letters)
- 8. Technique used to secure data and make it unreadable (10 letters)
- 10. Still learning the ropes, this fish swims close to danger but can steer clear with more care. (6 letters)
- 11. A type of engineering often used in phishing attacks (6 letters)
- 12. Sharp and speedy, this employee sniffs out phishing emails like a pro predator. (5 letters)
- 13. What companies need to have in case their files are compromised (6 letters)
- 14. Type of malware that locks your files until a ransom is paid (10 letters)
- 15. The mindset employees should maintain to avoid scams (5 letters)
- 17. Glides effortlessly past phishing attempts, never falling for those shiny hooks. (3 letters)
- 18. How employees should be to spot phishing emails and scams (8 letters)
Down
- 1. A security feature that adds an extra layer of protection (3 letters)
- 3. What employees should do when they spot a phishing email (6 letters)
- 4. The practice of protecting systems and networks from digital attacks (13 letters)
- 6. Email scam designed to steal information (5 letters)
- 7. Part of a phishing email, designed to trap you (4 letters)
- 9. The king of the sea and the inbox, spotting phishing emails before they even swim by!
- 12. Pretending to be someone you’re not online (8 letters)
- 16. Tiny and low on awareness, but there’s nowhere to go but up in the phishing food chain! (8 letters)