This is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
What is Cybersecurity?
Updating your password regularly and immediately changing passwords following a breach is an example of this.
What is Password Safety?
This is an email generated by an attacker sent to a mass audience from a fake corporate email requesting information from the audience.
What is a Mass Campaign?
This is an engineered attack that aims to trick people into providing sensitive details, such as passwords, social security numbers, banking information, etc.
What is Social Engineering?
This is the statute of limitation on HIPAA violations.
What is 6 years?
The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for another than authorized purpose.
What is a breach?
The process of transforming readable plaintext into unreadable cipher text to mask sensitive information from unauthorized users. Should be installed on every endpoint of healthcare system data.
What is encryption?
This is an email attack sent to one person or department requesting information or with attachments that may be malicious.
What is Spear Phishing?
This is a type of malware where an attacker deploys malware that encrypts data and demands payment before giving a decryption key.
What is Ransomware?
This is the time limit to submit a HIPAA violation complaint.
What is 180 days?
Information in a specific representation, usually as a sequence of symbols that have meaning.
What is data?
This is the understanding of where data resides, where it is accessed, and how it is shared. This is used to help determine how data should be stored and accessed.
What is Data Classification?
This is an email or request sent using a senior executive or high-profile name on the company to attempt to gain access to company information.
What is Whaling?
This is when devices are lost or stolen and used by attackers to gain information or data from an organization.
What is loss or theft of equipment or data?
This establishes a national set of security standards for protecting certain health information that is held or transferred in electronic form.
What is The Security Rule?
A term applied to the people who seek to exploit weaknesses in software and computer systems for their own gain.
What is an attacker?
This ensures software programs are updated to maintain the most updated security software.
What is Software Updates?
This is an email that is a copy of a legitimate email is sent out but the link is changed to a malicious link.
What is Clone Phishing?
This is when a person inside an organization either accidentally or maliciously deletes or removes data.
What is Insider data loss?
This violation is an unknown violation.
What is a Tier 1?
Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer.
What is malware?
This is a second password or login process that adds a second layer of security for data and applications.
What is MFA?
This is the practice of a hacker attempt to call or notify you of an email that will be sent, but the email has malicious links attached.
What is pretexting?
This is when attackers target network connected medical devices to gain access to the network.
What is a Medical Device Attack?
This is a violation from willful neglect that is not corrected within a required timeframe.
What is a Tier 4?