Phishing

123456789
Across
  1. 1. You should ____________ over links to see the actual URLs embedded
  2. 6. Urgent language, ____________ errors, or poor grammar can be signs of a phishing email
  3. 8. Malicious actors may design attack to steal login credentials such as username and _______
  4. 9. Avoid downloading ____________ from unknown senders, such as .exe, .pdf files
Down
  1. 2. ____________ are programs that encrypts files on a device
  2. 3. Always ____________ the sender via calls or text messages if in doubt
  3. 4. Be wary of emails that start with vague or ____________ greetings
  4. 5. ____________ is a social engineering attack that steals sensitive information
  5. 7. When in doubt, you should ____________ the email to IT Security team