Get Ahead of the HIPAA Security Rule Update With Secure Workload
Across
- 2. Keeping an up-to-date list of tech devices and app
- 6. Attacker’s movement sideways inside a system
- 8. Government rule guiding healthcare data protection
- 9. Things you label so you don’t forget
- 10. Many little fences inside one yard
- 11. A promise you hold without a receipt
Down
- 1. Extra layer proving who you are during login
- 3. Splitting networks to block threat spreads
- 4. Intent written down so it can’t wander
- 5. Be ready to bend and bounce back
- 7. The shadow you measure before it bites
- 9. Rules limiting who can see or do things