Patient Safety
Wearable Devices
Cybersecurity Terminology
Common Cyberattacks
Best Practices
100

This is one of the best ways for nurses to protect patients’ personal and health-related information.

What is to educate themselves on cybersecurity best practices?

100

A wearable device collects data using sensors and transmits that data continuously and in real-time to the user’s smartphone using this technology.

What is Bluetooth? 

100

This is a crucial defense strategy utilized by healthcare organizations created when employees view themselves as proactive protectors of patients and their data.

What is the culture of cybersecurity?

100

This type of malware is utilized when cybercriminals steal usernames, passwords, or other tokens.

What are credential stealers?

100

This simple action prevents cybercriminals from easily accessing multiple accounts if one of your accounts is compromised. 

What is using unique passwords?

200

This federal law requires covered entities to protect sensitive patient health information from being shared without the patient’s knowledge or consent.

What is the Health Insurance Portability and Accountability Act (HIPAA)?

200

Continuous data, numerical data (such as heart rate and number of steps taken), time-series data, real-time data, and data that is more suitable for research analysis are all characteristics that differentiate this type of data from traditional health data.

What is wearable health data? 

200

This technique helps to ensure that only authorized individuals have access to the information or data by scrambling it.

What is encryption?

200

These attacks delete all data entirely instead of breaching information or requiring a ransom for the data's return. 

What are wipers? 

200

Healthcare professionals should avoid using public Wi-Fi and instead use this type of network, such as a trusted VPN or their workplace network.

What is a secure network?

300

Hackers seek this type of information, which includes a patient’s name, phone number, social security number, address, etc.

What is personally identifiable information (PII)?

300

An example of a cyberattack on this device is an intruder changing the stimulation settings, which would immobilize patients with Parkinson's Disease. 

What is a neuroimplant? 

300

Maintaining regular software updates and the use of unique passwords are two examples of sustaining a good level of this

What is cyber hygiene?

300

Attempts to infect a user's device by offering unofficial versions of apps to install malicious software. 

What is mobile malware?

300

This simple technique ensures that healthcare professionals can recover their data in the event of a system failure or data breach.

What is the regular backup of their data?

400

This part of HIPAA focuses explicitly on protecting electronic health information.

What is the HIPAA Security Rule?

400

The most dangerous vulnerability of pacemakers allows a hacker to send unauthorized commands to the pacemaker. 

What is the authentication algorithm? 

400

A company can eliminate potential threats, damage, and cost by using this type of security that focuses on identifying and stopping inbound attacks before they reach an organization's system. 

What is prevention-focused security? 

400

This cyberattack can prevent your ability to effectively care for your patients by losing access to medical records and medical devices and holding them hostage.

What is ransomware?

400

If you receive a link embedded in an email, you should do this to display the actual web address the link will take you.

What is hover your mouse over the link?

500

Patient safety was in jeopardy when Britain’s National Health Service was attacked as part of this May 2017 ransomware attack on computer systems in 150 countries, resulting in canceled surgeries and diverting ambulances.

What is the “WannaCry” ransomware attack?

500

One example is when a hacker takes control of your fitness bracelet and makes it vibrate constantly until you pay them to turn it off. 

What is a Trojan-Ransom? 

500

This way of verifying a user’s identity is a practice that provides an extra layer of protection for sensitive data and should be enabled for all a user’s accounts.

What is two-factor authentication?

500

This common tactic involves a hacker pretending to be a colleague, manager, or authority figure to gain sensitive information.

What is phishing?

500

You receive an urgent call or email requesting sensitive patient information. You should do this to protect patient privacy.

What is using your organization’s official directory to call them back to confirm?

M
e
n
u