Across
- 3. Identity verification method
- 4. Use of personal tech at work
- 6. Entry
- 8. Secure message technique
Down
- 1. It comes in an email, not a pond
- 2. Malicious software
- 5. Security marking for government data
- 7. Prefix for digital security
- 9. Protector
- 10. Secret entry code
