Security Newsletter

12345678910111213141516171819
Across
  1. 6. Malicious software.
  2. 7. Nickname for the security team that created this crossword puzzle and handles security monitoring, alerts, and incidents.
  3. 8. This type of security tool helps block known computer viruses.
  4. 10. With whom should you share your passwords?
  5. 11. This type of data classification must not be shared and must be inventoried and protected. This includes PHI, passwords, access keys, and Tempus-generated unique identifiers such as patient-id, order-id, sample-id.
  6. 14. This security principle forces code to run with the lowest permission level possible.
  7. 15. This type of data classification is freely available to anyone and may be shared, such as information posted on our website.
  8. 16. Nickname for the security team that helps development implement security throughout the software development life cycle at Tempus.
  9. 17. Nickname for the security team that ensures Tempus data is classified, processed, and stored according to security policies.
  10. 18. This type of MFA to your phone is the least secure.
  11. 19. You should always connect to this when using the internet for work outside of the Tempus office.
Down
  1. 1. This type of vulnerability is new and does not yet have a fix.
  2. 2. This type of data classification must not be shared but does not require special inventory and protection. Examples include budgets, salary, source code, sales and business information, design documents and partner information.
  3. 3. Nickname for the security team that ensures that the right accounts have the right level of access to the right resources.
  4. 4. This is used to securely communicate, ensuring that a message can be read only by its sender and intended recipient.
  5. 5. Unwanted software for advertisements.
  6. 9. A malicious text, such as an unexpected text requesting gift cards by someone pretending to be our CEO.
  7. 11. A phishing campaign targeted at a specific individual or group of individuals.
  8. 12. Nickname for the security team that implements security measures to protect Tempus resources in the cloud.
  9. 13. Patient data must be protected to comply with this regulation.