Across
- 5. It's like your underwear; don't share it with anyone and change it at least every 90 days
- 6. Nasty software that can have a bad impact on your device or network
- 8. What is HIPAA's (and DDID's) minimum training requirement for employees
- 9. Unwanted emails or messages that usually try to sell you something
- 12. What department (or Shane) should you report a suspected HIPAA breach to
- 13. Universal Serial Bus, or a flash drive that you should never stick in a work computer
- 14. What HIPAA rule protects individual rights
- 16. A type of malicious software designed to block access until a sum of money is paid
Down
- 1. Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
- 2. The Health Act passed to protect individual's medical/dental records and other PHI
- 3. A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
- 4. Every aspect of protecting an organization and its employees/assets against cyber threats
- 7. How should you send an email to outside recipients that contains PHI
- 10. What is the acronym that identifies individual's information such as name, birthdate, and SSN
- 11. The additional ways DDID uses to stop hackers getting into our system, even if they know your password
- 14. An email that tricks you into clicking on a link or opening an attachment
- 15. Using a device to gain unauthorized access to data in a system