Across
- 3. An email that tricks you into clicking on a link or opening an attachment
- 4. Bad software installed on a computer to damage or harm it. Examples are viruses, ransomware, spyware, etc.
- 7. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket.
- 9. Unwanted emails or messages that usually try to sell you something
- 10. What is the acronym that identifies individual's information such as name, birthdate, and SSN
- 12. What type of information must be secured and protected?
- 13. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip though.
- 14. Who is the person you should report any HIPAA breaches?
- 15. If you receive a suspicious ___ hover over it with your mouse before clicking to make sure it is real
- 16. It's like your underwear; don't share it with anyone and change it at least every 90 days
- 17. How often does DDID require HIPAA training?
Down
- 1. What program is Shane in control of?
- 2. The process of transforming and encoding information to pass information securely
- 5. Unauthorized user with malicious intent
- 6. What is the private network you log into make you anonymous on the intranet?
- 8. Always ___ your devices and software when the newest version is available
- 10. What HIPAA rule protects individual rights
- 11. When multiple devices are connected together to share information. They are together in a ____.
