Cybersecurity Crossword Challenge

123456789101112131415
Across
  1. 2. A fake email or text that tries to steal information.
  2. 4. Keeping personal and health information protected.
  3. 6. Written rules that guide safe and compliant practices.
  4. 8. Software designed to damage or steal data.
  5. 10. Must be sent from a secured machine when it contains PHI.
  6. 12. When private or confidential information is accessed without permission.
  7. 15. What you should file if you notice a privacy or security issue.
Down
  1. 1. Information that must not be shared with unauthorized people.
  2. 2. A secret word used to log in securely.
  3. 3. The law that protects patient health information.
  4. 5. How systems, files, and conversations should always be kept.
  5. 7. Extra login security using a code or device.
  6. 9. What staff must wear to access the building.
  7. 11. Abbreviation for Protected Health Information.
  8. 13. A review process to check compliance with rules.
  9. 14. What you do to computers, doors, or files when unattended.