Get Ahead of the HIPAA Security Rule Update With Secure Workload

1234567891011
Across
  1. 3. Things you label so you don’t forget
  2. 4. Rules limiting who can see or do things
  3. 7. A promise you hold without a receipt
  4. 8. The shadow you measure before it bites
  5. 9. Government rule guiding healthcare data protection
  6. 10. Many little fences inside one yard
  7. 11. Intent written down so it can’t wander
Down
  1. 1. Extra layer proving who you are during login
  2. 2. Splitting networks to block threat spreads
  3. 3. Keeping an up-to-date list of tech devices and app
  4. 5. Be ready to bend and bounce back
  5. 6. Attacker’s movement sideways inside a system