Definitions
Best Practices
Goin' Phishing
5 threats
HIPAA-potamus
100

This is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.

What is Cybersecurity?

100

Updating your password regularly and immediately changing passwords following a breach is an example of this. 

What is Password Safety?

100

This is an email generated by an attacker sent to a mass audience from a fake corporate email requesting information from the audience.

What is a Mass Campaign?

100

This is an engineered attack that aims to trick people into providing sensitive details, such as passwords, social security numbers, banking information, etc.

What is Social Engineering?

100

This is the statute of limitation on HIPAA violations.

What is 6 years?

200

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for another than authorized purpose.

What is a breach?

200

The process of transforming readable plaintext into unreadable cipher text to mask sensitive information from unauthorized users. Should be installed on every endpoint of healthcare system data. 

What is encryption? 

200

This is an email attack sent to one person or department requesting information or with attachments that may be malicious.

What is Spear Phishing?

200

This is a type of malware where an attacker deploys malware that encrypts data and demands payment before giving a decryption key.

What is Ransomware?

200

This is the time limit to submit a HIPAA violation complaint.

What is 180 days?

300

Information in a specific representation, usually as a sequence of symbols that have meaning.

What is data?

300

This is the understanding of where data resides, where it is accessed, and how it is shared. This is used to help determine how data should be stored and accessed. 

What is Data Classification?

300

This is an email or request sent using a senior executive or high-profile name on the company to attempt to gain access to company information.

What is Whaling?

300

This is when devices are lost or stolen and used by attackers to gain information or data from an organization.

What is loss or theft of equipment or data?

300

This establishes a national set of security standards for protecting certain health information that is held or transferred in electronic form.

What is The Security Rule?

400

A term applied to the people who seek to exploit weaknesses in software and computer systems for their own gain.

What is an attacker?

400

This ensures software programs are updated to maintain the most updated security software.

What is Software Updates?

400

This is an email that is a copy of a legitimate email is sent out but the link is changed to a malicious link.

What is Clone Phishing?

400

This is when a person inside an organization either accidentally or maliciously deletes or removes data.

What is Insider data loss?

400

This violation is an unknown violation.

What is a Tier 1?

500

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer.

What is malware?

500

This is a second password or login process that adds a second layer of security for data and applications. 

What is MFA?

500

This is the practice of a hacker attempt to call or notify you of an email that will be sent, but the email has malicious links attached. 

What is pretexting? 

500

This is when attackers target network connected medical devices to gain access to the network.

What is a Medical Device Attack?

500

This is a violation from willful neglect that is not corrected within a required timeframe.

What is a Tier 4?