What Helios System or Template no one is allowed to change?
What is VH Gold?
This common security protocol is often used to protect the transmission of patient data over the internet.
What is SSL/TLS?
What kind of security control is being used in Adam's home to prevent the bears from entering his home?
What is Deterrent control? (gates, walls, fences, and bollards are designed to deter, delay, and deny, unauthorized access and threats to a site)
Healthcare providers are required to notify affected individuals within this many days after the discovery of a data breach under the U.S. HIPAA Breach Notification Rule.
What is 60 days?
This regulatory act in the United States establishes national standards for electronic health care transactions and code sets.
What is the Health Insurance Portability and Accountability Act (HIPAA)?
This term describes the process by which old patient records are rendered unreadable, either digitally or physically.
What is Data Destruction?
This two-factor authentication process at Virtual Health verifies the identity of a user by combining something they know with something they have.
What is Token-Based Authentication?
This action involves physically following an authorized person to gain access to a restricted area or building.
What is Tailgating? (Always kindly ask anyone whom you may not know to introduce him/herself)
Name the unauthorized practice where cybercriminals lock access to a healthcare organization's data and demand money to release it.
What is Ransomware?
This principle ensures that no single individual has control over all aspects of any critical transaction.
What is Separation of Duties? (no single Security/IT engineer at VH has access to all tools and infrastructure, we separate distribute it and utilize secondary approvals, even within the team)
This non-profit organization offers a set of guidelines and standards for the secure design and use of health IT systems.
What is the National Institute of Standards and Technology (NIST)?