This law helps prevent unintentional disclosure or access of PHI
HIPAA
Phishing
Sending emails pretending to be from a legitimate company in order to get individuals to reveal personal information, passwords or credit card information.
Malware
Software designed to disrupt, damage, gain unauthrized access to a computer system.
Passphrase
a sequence of words or text used to control access to computer system.
Everyone
vishing
making phne calls pretending to be from a reputable company in order to get protecteced information
Ransomeware
Type of malware that encrypts data or devices and demands a ransom to unlock them.
See Something Say Something
Report anything suspicious to Cyber Security team.
Data Classification and Encryption Policy
Outlines requirements for protecting assests (data) that are created, maintained, processed, or transmitted.
Smishing
Impersonation technique via text message.
Social Engineering
use of deception to manipulate individuals to divulge confidential or personal information for fraudulent purposes.
2 Factor Authentication
2FA is an identity and access management security method that requires 2 forms of id to access resources and data.