Across
- 3. Data Hostage
- 4. Data Recovery
- 5. Logs, Activity Tracking
- 7. Unique Authentication
- 8. Fake Identity
- 10. Secure Data
- 14. Virus Threats
- 15. Isolated Testing
- 17. Layered Authentication
- 18. Fake Emails
- 19. Engineering, Manipulative Tactics
Down
- 1. Unpatched Vulnerability
- 2. Security, Device Protection
- 6. Fake emails
- 9. Network Protection
- 11. Extra Verification
- 12. Insurance, Risk Coverage
- 13. Secure Connection
- 16. Network Overload
- 18. Software Updates