Across
- 2. The before-pic of your cybersecurity fitness journey
- 4. The grown-ups table for company decisions
- 5. The “ctrl+z” for disasters
- 7. The set of powers (like access, erase) given to a person under privacy laws
- 11. “Don’t do this” in formal writing
- 14. The cyber-beehive buzzing with clues
- 15. Fortune-teller’s favorite word
- 16. The “red flags” in the cyber crime scene
- 17. AI method: models train locally so raw data stays put
- 18. At Tekion, say “LUMOS!” to light up your software requests.
- 19. The fire drill script for hackers
- 20. Every Tekion deploy “leaps” through this pond!
Down
- 1. To strip removed details linking data back to real people
- 3. Digital “pinkie promise” you can’t break
- 6. Making secrets so secret even you forget them
- 8. When your diary writes in code
- 9. Keeping receipts for your servers
- 10. The goal algorithms treat people equally, not favoring some over others
- 12. At Tekion, if you need software access, this smart gatekeeper lights the way—no magic wand required!
- 13. Ethical hackers playing hide-and-seek in your network
