Cybersecurity and Compliance Week!

1234567891011121314
Across
  1. 4. What emails are you supposed to report to IT?
  2. 5. What is a security measure that requires at least two forms of identification?
  3. 7. Who is a person who gains unauthorized access to computer systems?
  4. 9. What is the process of converting data into a secure format?
  5. 11. Who is the HR Reporting Officer?
  6. 12. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
  7. 13. What is the term for the agreement between covered entities and business associates?
  8. 14. You are the first line of ___ in protection of DDID and AHS
Down
  1. 1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. 2. What is a central concept of HIPAA that protects individuals' health information?
  3. 3. Who is the HIPAA Privacy Officer?
  4. 6. What is the term for malicious software?
  5. 8. Who is the Security Officer?
  6. 10. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?