Cybersecurity
Across
- 3. gained technology access when not authorized
- 6. protecting patient healthcare information
- 9. safeguards data during transmission and storage
- 10. patient data remaining accessible
Down
- 1. passwords recommended for "logging in"
- 2. patient information kept private
- 4. patient records remaining accurate and intact
- 5. healthcare leading cause of security breaches
- 7. digitalized complete patient health information
- 8. recommended regularly for software integrity