Healthcare Cybersecurity & Technology

1234567891011121314151617
Across
  1. 5. Email security platform that learns normal communication patterns to detect unusual messages
  2. 6. Secure location where recipients may view encrypted messages
  3. 8. Protected Health Information that must be safeguarded
  4. 11. Manipulation tactic used to trick users rather than exploit technology
  5. 12. A recipient outside the organization that triggers encryption requirements
  6. 13. Something that deviates from typical email behavior
  7. 15. Keyword added to the subject line to send a secure email
  8. 16. Automated handling step that helps analyze reported suspicious emails
  9. 17. Type of AI approach that focuses on how people normally communicate
Down
  1. 1. Beginning of the legitimate URL used for encrypted email messages
  2. 2. Regulation that requires protection of patient information
  3. 3. Attack technique where the sender pretends to be someone you trust
  4. 4. The “normal” reference point used to spot suspicious email activity
  5. 7. Where the encryption keyword must be placed
  6. 8. Common email-based attack that tries to steal information or credentials
  7. 9. The action taken after a malicious email is identified
  8. 10. Email encryption service used to protect sensitive information
  9. 14. Legitimate but unwanted email that can be filtered out of your inbox