Healthcare Cybersecurity & Technology
Across
- 5. Email security platform that learns normal communication patterns to detect unusual messages
- 6. Secure location where recipients may view encrypted messages
- 8. Protected Health Information that must be safeguarded
- 11. Manipulation tactic used to trick users rather than exploit technology
- 12. A recipient outside the organization that triggers encryption requirements
- 13. Something that deviates from typical email behavior
- 15. Keyword added to the subject line to send a secure email
- 16. Automated handling step that helps analyze reported suspicious emails
- 17. Type of AI approach that focuses on how people normally communicate
Down
- 1. Beginning of the legitimate URL used for encrypted email messages
- 2. Regulation that requires protection of patient information
- 3. Attack technique where the sender pretends to be someone you trust
- 4. The “normal” reference point used to spot suspicious email activity
- 7. Where the encryption keyword must be placed
- 8. Common email-based attack that tries to steal information or credentials
- 9. The action taken after a malicious email is identified
- 10. Email encryption service used to protect sensitive information
- 14. Legitimate but unwanted email that can be filtered out of your inbox