Cybersecurity Crossword Challenge
Across
- 2. A fake email or text that tries to steal information.
- 4. Keeping personal and health information protected.
- 6. Written rules that guide safe and compliant practices.
- 8. Software designed to damage or steal data.
- 10. Must be sent from a secured machine when it contains PHI.
- 12. When private or confidential information is accessed without permission.
- 15. What you should file if you notice a privacy or security issue.
Down
- 1. Information that must not be shared with unauthorized people.
- 2. A secret word used to log in securely.
- 3. The law that protects patient health information.
- 5. How systems, files, and conversations should always be kept.
- 7. Extra login security using a code or device.
- 9. What staff must wear to access the building.
- 11. Abbreviation for Protected Health Information.
- 13. A review process to check compliance with rules.
- 14. What you do to computers, doors, or files when unattended.