Healthcare Cybersecurity & Technology

1234567891011121314151617
Across
  1. 1. The uninvited guest at your New Year’s gala
  2. 4. Drop this before the ball drops to fix vulnerabilities
  3. 6. A security goal you set for the new year
  4. 8. The burst of alerts when a breach attempt happens
  5. 13. What you do after a successful phishing simulation
  6. 15. The ticking clock before a patch deadline
  7. 16. A bright idea for improving password hygiene
  8. 17. The fake invite that ruins the party
Down
  1. 2. The immunity booster for your digital health
  2. 3. The healthcare privacy rule you resolve to follow
  3. 5. The double-check before entering the VIP cyber lounge
  4. 7. The barrier that keeps party crashers out of your network
  5. 9. The champagne bottle seal for your patient data
  6. 10. The strict guest list for your cyber celebration
  7. 11. The hour when systems roll over to new logs
  8. 12. Continuous monitoring tools in action
  9. 13. Bits of data scattered after a ransomware attack
  10. 14. Your safety net before the countdown begins