Security Crossword
Across
- 3. This type of data classification is freely available to anyone and may be shared, such as information posted on our website.
- 4. This type of MFA to your phone is the least secure.
- 5. This type of data classification must not be shared but does not require special inventory and protection. Examples include budgets, salary, source code, sales and business information, design documents and partner information.
- 7. You should always connect to this when using the internet outside of the Tempus office.
- 9. Unwanted software for advertisements.
- 11. Nickname for the security team that created this crossword puzzle and handles security monitoring, alerts, and incidents.
- 12. This type of vulnerability is new and does not yet have a fix.
- 13. This is used to make data secure so that anyone viewing the information cannot understand it without a key.
- 15. A malicious text, such as an unexpected text requesting gift cards by someone pretending to be our CEO.
- 17. Nickname for the security team that ensures that the right accounts have the right level of access to the right resources.
- 18. A phishing campaign targeted at a specific individual or group of individuals.
- 19. Nickname for the security team that implements security throughout the development of Tempus products.
Down
- 1. Nickname for the security team that implements security measures to protect Tempus resources in the cloud.
- 2. This type of security tool helps block known computer viruses.
- 4. This type of data classification must not be shared and must be inventoried and protected. This includes PHI, passwords, access keys, and Tempus-generated unique identifiers such as patient-id, order-id, sample-id.
- 6. This security principle forces code to run with the lowest permission level possible.
- 8. Share your passwords with them.
- 10. Nickname for the security team that ensures Tempus data is classified, processed, and stored according to security policies.
- 14. Patient data must be protected to comply with this regulation.
- 16. Malicious software.