Ransomware is a type of _______ software designed to block access to data.
What is malicious or malware?
The HIPAA rule designed to protect electronic protected health information (ePHI).
What is the Security Rule?
Frequent _______ are essential to recovering data after a ransomware attack.
What are backups?
Clicking on a suspicious _______ can be an early sign of ransomware.
What is a link or file?
If ePHI is encrypted by ransomware, this is considered a _______ unless proven otherwise.
What is a breach?
Ransomware typically encrypts data and demands payment in _______.
What is cryptocurrency?
One key prevention strategy under HIPAA is training employees to detect and report _______.
What is malicious software?
Backups should be stored _______ to protect them from ransomware.
What is offline?
An unexplained increase in _______ activity can indicate a ransomware attack.
What is CPU or disk?
A breach must be reported to affected individuals and this federal agency.
What is the Department of Health and Human Services (HHS)?
True or False: Ransomware can also destroy or steal data.
What is True?
Limiting access to ePHI is done through _______ controls.
What are access controls?
This plan helps organizations prepare for emergencies like ransomware attacks.
What is a contingency plan?
Ransomware often alerts the user of its presence to demand _______.
What is payment?
he four factors considered in a risk assessment include the extent of the PHI involved, the unauthorized person, whether it was viewed, and _______.
What is the extent to which the risk was mitigated?
The key used to decrypt data encrypted by ransomware is known only to _______.
Who are the hackers?
Conducting this process helps identify risks and vulnerabilities to ePHI.
What is a risk analysis?
Test restorations are conducted to verify the _______ of backed-up data.
What is integrity?
These tools can detect suspicious communications between ransomware and hackers.
What are intrusion detection systems?
PHI encrypted before an attack and secured according to HIPAA standards may not require _______.
What is breach notification?
The most common form of payment requested by hackers in a ransomware attack.
What is Bitcoin?
Updating this software can prevent security breaches caused by outdated technology.
What is firmware?
The organization responsible for assisting ransomware victims and pursuing cybercriminals.
What is the FBI or Secret Service?
The first step in responding to ransomware is activating the _______ plan.
What is a security incident response plan?
A reportable breach must also be disclosed to this group if over 500 individuals are affected.
What is the media?