BYOD Gone Wrong

12345678910
Across
  1. 3. All caps, red flag: your OS is how many versions behind?!
  2. 6. That WiFi network at the café that looks... a little too open.
  3. 7. What your security posture becomes with no policies, no logs, and no control.
  4. 9. When your laptop goes rogue — and IT has no clue where it went.
  5. 10. Zero Trust isn’t just a motto — it’s a security _____.
Down
  1. 1. The invisible wall between secure data and everything else.
  2. 2. A device you use at work... that security never approved.
  3. 4. Unprotected, unfiltered, and uninvited: a hacker’s dream data stream.
  4. 5. It’s not a cape, but it does prevent data exfiltration.
  5. 8. No login federation here — just 17 browser tabs and reused passwords.