Across
- 1. Foundation of both cybersecurity and team collaboration
- 2. Common attack vector for phishing and scams
- 3. What you should never do with suspicious links or attachments
- 6. A vulnerability in software waiting to be exploited
- 7. Guidelines that govern secure workplace behavior
Down
- 1. A physical or digital object used for multi-factor authentication
- 4. What hackers see unaware employees as
- 5. A potential danger that exploits system vulnerabilities
- 7. The chance that a threat will exploit a vulnerability
