Compliance & Security Week Take 2

123456789101112131415161718
Across
  1. 6. What is a digital "wall" that keeps bad guys out of our network?
  2. 7. What is the type of data HIPAA protects?
  3. 9. What do we have monitoring the security of our buildings?
  4. 11. What is required when PHI is disclosed beyond treatment, payment, or operations?
  5. 12. What is it when a bad threat actor gains unauthorized access to a system or building?
  6. 14. Who is the person who reviews all reported emails?
  7. 15. Where do you receive points for competing in Compliance and Cybersecurity week?
  8. 17. What is the state of being informed about potential risks and company policies so you can make smart, safe choices every day?
  9. 18. What is it when a bad actor covers up a good QR code with one that will send you to a fake payment site?
Down
  1. 1. What is a common workplace rule that requires locking before leaving your desk?
  2. 2. What is a formal review of tasks done to confirm they're in compliance?
  3. 3. What is a weakness in a system that can be exploited and has a CVE library?
  4. 4. What is the law protecting patient health information?
  5. 5. What you need after having to do all the compliance trainings and shenanigans? (a break from work somewhere)
  6. 8. What is a beverage that fuels many morning meetings?
  7. 10. What is a quick-ish fix for software vulnerabilities?
  8. 13. What do we call the process of converting data into a secure code to protect it?
  9. 16. What is a word puzzle that challenges your brain?
  10. 17. What is a quick way to spot a phishing email at DDID/AHS? (Sender's...?)