Fundamentals
Keep Out
The Dangers
Protect your assets
100

This law helps prevent unintentional disclosure or access of PHI

HIPAA

100

Phishing

Sending emails pretending to be from a legitimate company in order to get individuals to reveal personal information, passwords or credit card information. 

100

Malware

Software designed to disrupt, damage, gain unauthrized access to a computer system.

100

Passphrase

a sequence of words or text used to control access to computer system. 

200
Who is responsible for proper data handling? 

Everyone

200

vishing

making phne calls pretending to be from a reputable company in order to get protecteced information

200

Ransomeware

Type of malware that encrypts data or devices and demands a ransom to unlock them. 

200

See Something Say Something

Report anything suspicious to Cyber Security team. 


300

Data Classification and Encryption Policy

Outlines requirements for protecting assests (data) that are created, maintained, processed, or transmitted. 

300

Smishing

Impersonation technique via text message.

300

Social Engineering

use of deception to manipulate individuals to divulge confidential or personal information for fraudulent purposes.

300

2 Factor Authentication

2FA is an identity and access management security method that requires 2 forms of id to access resources and data. 

M
e
n
u