Across
- 1. The uninvited guest at your New Year’s gala
- 4. Drop this before the ball drops to fix vulnerabilities
- 6. A security goal you set for the new year
- 8. The burst of alerts when a breach attempt happens
- 13. What you do after a successful phishing simulation
- 15. The ticking clock before a patch deadline
- 16. A bright idea for improving password hygiene
- 17. The fake invite that ruins the party
Down
- 2. The immunity booster for your digital health
- 3. The healthcare privacy rule you resolve to follow
- 5. The double-check before entering the VIP cyber lounge
- 7. The barrier that keeps party crashers out of your network
- 9. The champagne bottle seal for your patient data
- 10. The strict guest list for your cyber celebration
- 11. The hour when systems roll over to new logs
- 12. Continuous monitoring tools in action
- 13. Bits of data scattered after a ransomware attack
- 14. Your safety net before the countdown begins
