Healthcare Cybersecurity & Technology

123456789101112131415161718
Across
  1. 5. Where the encryption keyword must be placed
  2. 10. Attack technique where the sender pretends to be someone you trust
  3. 11. Regulation that requires protection of patient information
  4. 13. Protected Health Information that must be safeguarded
  5. 15. Something that deviates from typical email behavior
  6. 16. Beginning of the legitimate URL used for encrypted email messages
  7. 17. Manipulation tactic used to trick users rather than exploit technology
  8. 18. Automated handling step that helps analyze reported suspicious emails
Down
  1. 1. Type of AI approach that focuses on how people normally communicate
  2. 2. Legitimate but unwanted email that can be filtered out of your inbox
  3. 3. Email encryption service used to protect sensitive information
  4. 4. The action taken after a malicious email is identified
  5. 6. A recipient outside the organization that triggers encryption requirements
  6. 7. Keyword added to the subject line to send a secure email
  7. 8. Common email-based attack that tries to steal information or credentials
  8. 9. Email security platform that learns normal communication patterns to detect unusual messages
  9. 12. Secure location where recipients may view encrypted messages
  10. 14. The “normal” reference point used to spot suspicious email activity