Phish or No Phish
Passwords
Patient Data Protectors
Trick or Treat
Trust Inside Out
100

An email says your mailbox is "almost full" and provides a link or attachment to "fix it now."

What is a phishing attempt?

100

This is the recommended minimum length for a strong password at the organization.

What is a 8-15 characters?

100

This federal law protects patient health information and requires us to safeguard PHI.

What is HIPAA?

100

Clicking a pop-up ad that promises a free gift card.

What is a trick (Cyber threat)?

100

An employee downloads patient records to a personal USB drive without approval.

What is insider risk?

200

Usually an email that looks like it is from a legitimate organization or person. Usually contains malware through a link or file.

What is PHISHING?

200

This security measure requires you to use more than just a password to log in.

What is multi-factor authentication (MFA)?

200

Leaving a patient chart open on a workstation where others can see it is an example of this.

What is a data privacy violation?

200

Verifying a phone call by checking the callback number and asking for the "animal of the day" in the information services webpage before giving any information.

What is a treat (Safe Behavior)?

200

True or false: Most insider threats are caused by malicious employees trying to harm the organization.

What is false? (Most are accidental/negligent.)

300

A reminder email from IT comes from "@childrensnational.org" and asks you to update your password only through the secure portal.

What is a legitimate message?

300

True or false: It is okay to share your password with a trusted coworker if they need quick access.

What is FALSE?

300

Sending PHI over email requires this type of protection.

What is encryption?

300

Downloading a "Halloween screensaver" from an unknown website on your company computer.

What is a trick (malware risk)?

300

During offboarding, this critical step must happen to prevent insider risk.

What is revoking system access and retrieving assets?

400

An email claims you need to verify your hospital ID "immediately" to avoid being locked. It asks you to click a link and enter your credentials.

What is a phishing attempt (urgent + credential theft).

400

A strong password should include these four character types.

What are uppercase letters, lowercase letters, numbers, and symbols?

400

Taking patient files home without permission or secure storage is an example of this.

What is unauthorized removal of PHI (HIPAA violation)?

400

Receiving a text from "your bank" claiming suspicious charges and asking for your account number.

What is a trick (smishing/scam)?

400

A clinician clicks a phishing link and unknowingly gives an attacker access. This type of insider threat is called what?

What is an unintentional insider threat?

500

You get a calendar invite from a colleague with an attachment labeled "invoice.doc" that you were not expecting.

What is a phishing attempt (malicious attachment)

500

Using the same password across work and personal accounts creates this risk.

What is credential stuffing (attackers reusing stolen passwords)?

500

Sharing patient case details on social media, even without names, can still risk this.

What is an unintentional disclosure of PHI (Privacy breach)?

500

Reporting a suspicious email to IT security using the "Report Phish" button.

What is a treat (best practice)?

500

Employees who intentionally steal or sabotage hospital data fall under this category.

What is a malicious insider threat?

M
e
n
u