Across
- 1. You should ____________ over links to see the actual URLs embedded
- 6. Urgent language, ____________ errors, or poor grammar can be signs of a phishing email
- 8. Malicious actors may design attack to steal login credentials such as username and _______
- 9. Avoid downloading ____________ from unknown senders, such as .exe, .pdf files
Down
- 2. ____________ are programs that encrypts files on a device
- 3. Always ____________ the sender via calls or text messages if in doubt
- 4. Be wary of emails that start with vague or ____________ greetings
- 5. ____________ is a social engineering attack that steals sensitive information
- 7. When in doubt, you should ____________ the email to IT Security team
