Across
- 4. _______________ are programs that encrypts files on a device
- 5. When in doubt, you should _______________ the email to IT Security team
- 7. You should _______________ over links to see the actual URLs embedded
- 8. Urgent language, _______________ errors, or poor grammar can be signs of a phishing email
- 9. Always _______________ with the sender via calls or text messages if in doubt
Down
- 1. Avoid downloading _______________ from unknown senders, such as .exe, .pdf files
- 2. _______________ is a social engineering attack that steals sensitive information
- 3. Be wary of emails that start with vague or _______________ greetings
- 6. Malicious actors may design attack to steal login credentials such as username and _______________
