Get Ahead of the HIPAA Security Rule Update With Secure Workload

123456789101112
Across
  1. 3. Intent written down so it can’t wander
  2. 6. A promise you hold without a receipt
  3. 7. Be ready to bend and bounce back
  4. 10. Many little fences inside one yard
  5. 11. Rules limiting who can see or do things
Down
  1. 1. Splitting networks to block threat spread
  2. 2. Extra layer proving who you are during login
  3. 4. Attacker’s movement sideways inside a system
  4. 5. Keeping an up-to-date list of tech devices and apps
  5. 8. Things you label so you don’t forget
  6. 9. Government rule guiding healthcare data protection
  7. 12. The shadow you measure before it bites