Get Ahead of the HIPAA Security Rule Update With Secure Workload

123456789101112
Across
  1. 2. Be ready to bend and bounce back
  2. 5. The shadow you measure before it bites
  3. 7. Attacker’s movement sideways inside a system
  4. 9. Keeping an up-to-date list of tech devices and apps
  5. 10. A promise you hold without a receipt
  6. 11. Splitting networks to block threat spread
  7. 12. Intent written down so it can’t wander
Down
  1. 1. Rules limiting who can see or do things
  2. 3. Government rule guiding healthcare data protection
  3. 4. Extra layer proving who you are during login
  4. 6. Many little fences inside one yard
  5. 8. Things you label so you don’t forget