Across
- 3. All caps, red flag: your OS is how many versions behind?!
- 6. That WiFi network at the café that looks... a little too open.
- 7. What your security posture becomes with no policies, no logs, and no control.
- 9. When your laptop goes rogue — and IT has no clue where it went.
- 10. Zero Trust isn’t just a motto — it’s a security _____.
Down
- 1. The invisible wall between secure data and everything else.
- 2. A device you use at work... that security never approved.
- 4. Unprotected, unfiltered, and uninvited: a hacker’s dream data stream.
- 5. It’s not a cape, but it does prevent data exfiltration.
- 8. No login federation here — just 17 browser tabs and reused passwords.
