What you don't know may hurt you. Failing to keep up to date on important cybersecurity issues can leave you wide open for a HIPAA breach. Keeping in sync with the hot terms in health IT allows your agency to prepare for and be part of healthcare's security conversation - and protect your organization in the process. Keep your team members knowledgeable and IT lexicon current with these 10 cybersecurity must-knows: 1. Brute Force: A cyber-hijack that involves brute force breaks systems by repeatedly trying different passwords until finding one that finally works. Once the encryption is compromised, the hackers can take down the system. Find an overview of brute force attacks on healthcare and how to combat them by the Department of Homeland Security at www.dhs.gov/sites/default/files/publications/Encryption-Software-TN_0913-508.pdf. 2. Cloud Computing: This type of health IT is "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service-provider interaction," instructs the National Institute of Standards and Technology (NIST). Cloud computing remains a popular, cost-saving technology in healthcare with a plethora of certified vendors, but recent HHS Office for Civil Rights data attributes some common breach issues to problems with poorly configured systems with the culprit - cloud computing technologies. 3. DDoS Attack: Distributed Denial of Service attacks wiggle into your systems and attack your resources, stopping your ability to do business. "Hackers accomplish a DDoS attack by literally sending so much web traffic at a target that it is unable to function," notes Homeland Security's fact sheet on DDoS attacks. A famous DDoS healthcare case involved the takedown of Boston Children's Hospital's servers in 2014 by hackers from the group Anonymous. 4. Handshake Traffic: This back-and-forth greeting centers on the agreement of two systems to do business. Technically speaking, it refers to the "protocol dialogue between two systems for identifying and authenticating themselves to each other, or for synchronizing their operations with each other," the NIST guidance says. 5. Internet of Things: Also known as the IoT, the internet of things concerns the connection of devices, systems, objects, and more to the internet. This coordination supports the idea that connecting everything in your office and life will make providing healthcare services more efficient and easier - but, that's not always the case. With each new hookup, the opportunity for the loss of electronic protected health information (ePHI) rises. 6. Jailbreak: This is a slang term that concerns the override of restrictions, usually on mobile devices like cellphones and tablets, in order to decrypt and install malware, illegal software, and/or other barred applications. For this reason, it is critical to keep all your agency's devices locked with multifactor authentication and at-rest protocols as hackers may attempt to jailbreak a mobile unit when you leave these tools unattended. 7. KRACK: Key Reinstallation Attacks, or KRACKs, happen when a hacker uses weaknesses in Wi-Fi systems. "An attacker within the wireless communications range of an affected [access point] AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocol being used," says the U.S. Computer Emergency Readiness Team (CERT) in vulnerability report VU #228519. The only way to eradicate KRACK issues is to consistently install updates to impacted products. See the US-CERT report at www.kb.cert.org/vuls/id/228519. 8. Mobile Device Management: Often referred to under its acronym MDM, mobile device management covers the administration of a provider's mobile devices, and also the security, updates and upgrades, implementation, and protection of these devices. MDM software helps with the organization of your agency cellphones, tablets, and laptops to ensure the protection of ePHI. 9. 2FA: Formerly known as two-factor authentication, this type of encryption increases the protection of your devices by requiring both a password and another security measure. This adds another layer of user authentication for covered entities to protect ePHI. 10. Virtual Private Network: Though many remote users know this term under its acronym VPN, they often don't know what it means. A VPN allows you to securely share your health data in a public network through the utilization of a private and secure network. The VPN offers you online protection virtually, and the utilization of a secure VPN remains a top tip to "help secure and protect PHI on mobile devices," according to the October 2017 edition of the OCR Cybersecurity Newsletter.