Phishing

123456789
Across
  1. 4. _______________ are programs that encrypts files on a device
  2. 5. When in doubt, you should _______________ the email to IT Security team
  3. 7. You should _______________ over links to see the actual URLs embedded
  4. 8. Urgent language, _______________ errors, or poor grammar can be signs of a phishing email
  5. 9. Always _______________ with the sender via calls or text messages if in doubt
Down
  1. 1. Avoid downloading _______________ from unknown senders, such as .exe, .pdf files
  2. 2. _______________ is a social engineering attack that steals sensitive information
  3. 3. Be wary of emails that start with vague or _______________ greetings
  4. 6. Malicious actors may design attack to steal login credentials such as username and _______________