Cyber Security Awareness Month

Edit Answers
SHPQDVCPWZUTETDFDOJK AXFIDULRQRZOVHKZGWHU FMUDAHTURFUJWIUNOSIN PASSWORDGSOLYNGBVWPX KSCRADGGMANZTKIUPYAF SIKOUCNWMHSOACLJCXAG EKVTMUIVOJDWZLUDNWHJ EIYNEOHGMCDVOISXGROO YNBFROSAJGNEHCEBUIAL OKVUGWINFGOWLKGLVLIV LKULYCHLOSTANDSTOLEN PDZCMKPBRUYDWSYGPSRI MZZGTDAONUELCFWYMAAA ETCGREIYHXNIQMIOGDWD CICJMLFICYFSBUGAGQTC YKCGPTFIFTEENRAZEOFU ZDOWGHSJOZZMXYHKHJOI YMEVSLIKGYHUMANYKSSD EWIYKFTOUJZHAPUTIKZE CKDUHNJDMDPVJSLBTQWV
1.
______ error is the most exploited by criminals
2.
An attempt by criminals to get you to click a link or attachment in an email
3.
The law that protects PHI
4.
Protected Health Information
5.
Always ____ before you ____.
6.
Always report these devices to your supervisor or IT department
7.
______ are the first line of defense in any secure network (You are one of these)
8.
Always keep this a secret
9.
What is the minimum number of characters needed for a password in our organization?
10.
Never download any unapproved __________.