Compliance & Security Week

12345678910111213141516
Across
  1. 5. It's like your underwear; don't share it with anyone and change it at least every 90 days
  2. 6. Nasty software that can have a bad impact on your device or network
  3. 8. What is HIPAA's (and DDID's) minimum training requirement for employees
  4. 9. Unwanted emails or messages that usually try to sell you something
  5. 12. What department (or Shane) should you report a suspected HIPAA breach to
  6. 13. Universal Serial Bus, or a flash drive that you should never stick in a work computer
  7. 14. What HIPAA rule protects individual rights
  8. 16. A type of malicious software designed to block access until a sum of money is paid
Down
  1. 1. Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
  2. 2. The Health Act passed to protect individual's medical/dental records and other PHI
  3. 3. A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
  4. 4. Every aspect of protecting an organization and its employees/assets against cyber threats
  5. 7. How should you send an email to outside recipients that contains PHI
  6. 10. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  7. 11. The additional ways DDID uses to stop hackers getting into our system, even if they know your password
  8. 14. An email that tricks you into clicking on a link or opening an attachment
  9. 15. Using a device to gain unauthorized access to data in a system