Across
- 3. Software that may be installed during a phishing attack that is intended to harm your computer.
- 5. Check to make sure any ____ in an email is legitimate before clicking on it.
- 6. Your MDT resource for more information on phishing: Stop.Think._______.
- 7. _____ phishing is when an individual is targeted for an attack instead of being part of an attempt to scam a large pool of people
- 8. The most common form of a phishing scam
- 9. Usernames and _________ are a key piece of information targeted during a phishing attempt
- 10. ________ and grammar mistakes can be a key indicator of a phishing email
- 12. Be sure to verify the _____ of a website to make sure it is legitimate before visiting it.
- 14. A phishing scam may ________ to close an account or take other actions against you if you do not immediately follow the instructions.
Down
- 1. The people behind attacks on your computer.
- 2. If you believe you have been the ______ of a phishing attack, you should report it immediately.
- 4. Who to contact when you suspect a phishing attempt.
- 11. Attackers may try to create a sense of _______ in order to have you quickly follow their instructions and allow them to get your information.
- 13. Phishing _____ come in over the phone and are just as deceptive and dangerous as online phishing attacks.
- 15. _____ over anything with a hyperlink in an email to make sure it is taking you to the correct location
