How One Guy Became the Office’s Last Line of Defense

12345678910
Across
  1. 2. Cyber criminals.
  2. 5. Today's hero.
  3. 8. Stops unauthorized access.
  4. 9. Act of notifying suspicious activity.
  5. 10. Group of interconnected computers.
Down
  1. 1. Primary phishing tool.
  2. 3. Program that runs on a computer.
  3. 4. Deceptive email tactic.
  4. 6. Measures to protect data.
  5. 7. Notification of potential threat.