Across
- 3. expert data destruction
- 4. not your pet's name, if strong
- 6. not in the open
- 7. your best response
- 8. sneaky followers
- 9. how much data you should see?
- 10. what secrets should be
- 12. when hacks happen
- 13. secure neckware, sometimes
- 14. scams in your email
- 15. required for access
Down
- 1. the digital threat
- 2. electronic infection
- 5. vitamins for software
- 7. for your eyes only
- 9. do this to your computer when you walk away
- 11. criminals payday
