Phishing

123456789101112131415
Across
  1. 3. Software that may be installed during a phishing attack that is intended to harm your computer.
  2. 5. Check to make sure any ____ in an email is legitimate before clicking on it.
  3. 6. Your MDT resource for more information on phishing: Stop.Think._______.
  4. 7. _____ phishing is when an individual is targeted for an attack instead of being part of an attempt to scam a large pool of people
  5. 8. The most common form of a phishing scam
  6. 9. Usernames and _________ are a key piece of information targeted during a phishing attempt
  7. 10. ________ and grammar mistakes can be a key indicator of a phishing email
  8. 12. Be sure to verify the _____ of a website to make sure it is legitimate before visiting it.
  9. 14. A phishing scam may ________ to close an account or take other actions against you if you do not immediately follow the instructions.
Down
  1. 1. The people behind attacks on your computer.
  2. 2. If you believe you have been the ______ of a phishing attack, you should report it immediately.
  3. 4. Who to contact when you suspect a phishing attempt.
  4. 11. Attackers may try to create a sense of _______ in order to have you quickly follow their instructions and allow them to get your information.
  5. 13. Phishing _____ come in over the phone and are just as deceptive and dangerous as online phishing attacks.
  6. 15. _____ over anything with a hyperlink in an email to make sure it is taking you to the correct location