Across
- 4. An app or feature that generates temporary access codes for 2FA.
- 6. Unsolicited, bulk, and often malicious emails.
- 7. Use this feature to prevent unwanted messages or interactions online.
- 8. Action to take when encountering suspicious friend requests.
- 10. Illegal act of obtaining personal or financial information by deception.
- 12. Ensure you log out of these on public computers.
- 14. Adjust these on social media to limit who sees your posts.
Down
- 1. Monitoring online activities to gather sensitive personal information.
- 2. Never overshare this information online, like your address or birthdate.
- 3. Avoid posting this type of location information when traveling.
- 5. The practice of protecting sensitive data by converting it into unreadable text.
- 9. A method hackers use to intercept communication on public networks.
- 11. Type of malware that locks your files until a payment is made.
- 13. The act of pretending to be someone else online to steal sensitive data.
