Across
- 2. Before clicking links or sharing info, always _____ unexpected messages or calls through official channels.
- 3. Instead of writing credentials down, use a _____ manager to store and encrypt them safely.
- 5. Set a short timeout for your _____ so your phone auto-locks quickly when idle.
- 8. Apply security _____ regularly to close known vulnerabilities before they can be exploited.
- 9. Using public _____ may expose your device to threats; connect only if necessary and with added protections like a VPN.
- 10. Enable device _____ features to find, lock, or wipe your phone remotely in case of loss.
- 11. Adding _____ to your logins ensures stolen passwords alone won’t give attackers full access.
- 12. Set a distinct _____ on your phone to prevent unauthorized access if it’s lost, even for a short time.
- 13. Turn off _____ when you're not using it—this wireless feature can be targeted for silent data access.
Down
- 1. Use _____ like fingerprint or face ID as a fast and secure alternative to typing your credentials.
- 4. Check your app _____ regularly to limit unnecessary access to your microphone, location, or files.
- 6. Ensure _____ is turned on to protect the data on your phone if it’s stolen or lost.
- 7. To avoid risky software, download apps only from trusted _____ sources like the Play Store or App Store.
