Compliance & Security Week

1234567891011121314151617
Across
  1. 3. An email that tricks you into clicking on a link or opening an attachment
  2. 4. Bad software installed on a computer to damage or harm it. Examples are viruses, ransomware, spyware, etc.
  3. 7. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket.
  4. 9. Unwanted emails or messages that usually try to sell you something
  5. 10. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  6. 12. What type of information must be secured and protected?
  7. 13. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip though.
  8. 14. Who is the person you should report any HIPAA breaches?
  9. 15. If you receive a suspicious ___ hover over it with your mouse before clicking to make sure it is real
  10. 16. It's like your underwear; don't share it with anyone and change it at least every 90 days
  11. 17. How often does DDID require HIPAA training?
Down
  1. 1. What program is Shane in control of?
  2. 2. The process of transforming and encoding information to pass information securely
  3. 5. Unauthorized user with malicious intent
  4. 6. What is the private network you log into make you anonymous on the intranet?
  5. 8. Always ___ your devices and software when the newest version is available
  6. 10. What HIPAA rule protects individual rights
  7. 11. When multiple devices are connected together to share information. They are together in a ____.