Get Ahead of the HIPAA Security Rule Update With Secure Workload

1234567891011
Across
  1. 2. Keeping an up-to-date list of tech devices and app
  2. 6. Attacker’s movement sideways inside a system
  3. 8. Government rule guiding healthcare data protection
  4. 9. Things you label so you don’t forget
  5. 10. Many little fences inside one yard
  6. 11. A promise you hold without a receipt
Down
  1. 1. Extra layer proving who you are during login
  2. 3. Splitting networks to block threat spreads
  3. 4. Intent written down so it can’t wander
  4. 5. Be ready to bend and bounce back
  5. 7. The shadow you measure before it bites
  6. 9. Rules limiting who can see or do things