Across
- 6. What is a digital "wall" that keeps bad guys out of our network?
- 7. What is the type of data HIPAA protects?
- 9. What do we have monitoring the security of our buildings?
- 11. What is required when PHI is disclosed beyond treatment, payment, or operations?
- 12. What is it when a bad threat actor gains unauthorized access to a system or building?
- 14. Who is the person who reviews all reported emails?
- 15. Where do you receive points for competing in Compliance and Cybersecurity week?
- 17. What is the state of being informed about potential risks and company policies so you can make smart, safe choices every day?
- 18. What is it when a bad actor covers up a good QR code with one that will send you to a fake payment site?
Down
- 1. What is a common workplace rule that requires locking before leaving your desk?
- 2. What is a formal review of tasks done to confirm they're in compliance?
- 3. What is a weakness in a system that can be exploited and has a CVE library?
- 4. What is the law protecting patient health information?
- 5. What you need after having to do all the compliance trainings and shenanigans? (a break from work somewhere)
- 8. What is a beverage that fuels many morning meetings?
- 10. What is a quick-ish fix for software vulnerabilities?
- 13. What do we call the process of converting data into a secure code to protect it?
- 16. What is a word puzzle that challenges your brain?
- 17. What is a quick way to spot a phishing email at DDID/AHS? (Sender's...?)
