
Across:
1. Time for a digital refresh! Do this to your software to keep everything running smoothly.
3. This phishing-resistant authentication method protects accounts without having to remember a password.
5. Dust-busting for your hard drive.
7. Clear out these little crumbs websites leave behind after you visit, just like wiping down counters.
8. Marie Kondo-ing of programs that no longer spark joy.
Down:
2. Do a spring cleaning of your inbox to avoid these “fool” emails that try to hook your data.
4. Sweep away harmful software with security tools, just like vacuuming up dirt and debris from every corner of your digital space.
6. Like dust bunnies hiding under the couch, these are unwanted programs that can slow down your system’s performance.
Read Next
Shoring Up Subsea Security: A Comprehensive Action Plan to Promote Submarine Cable Resiliency, Security, & Governance
Submarine cables are the essential infrastructure enabling the global economy. This paper recommends enhancing the resilience of the ecosystem through greater route diversity and redundancy, rapid repair capacity, and secure supply chain.
Connect the Terms: The Cyber Policy Watchlist
Challenge yourself to connect words into four mystery categories.
Recap - Offensive Cyber Operations: Charting a Legal and Strategic Path Forward
The discussion around offensive cyber operation may be quickly moving from theoretical to practical and CCPL’s “Offensive Cyber Operations: Charting a Legal and Strategic Path Forward,” looked at the challenges around this topic.