P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
    • OCR Audit Preparedness
      • Promoting Interoperability Programs
      • Passing an Audit
      • Audit Readiness Best Practices
  • HITRUST Compliance
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
Category

COVID-19

COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Lost or Stolen Devices

Organizations have come to rely on a variety of mobile devices for daily operations, telehealth/telework…
Jordan Keating
Jordan KeatingJune 26, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

FAQs on Telehealth and HIPAA During COVID-19

What is telehealth?    The Health Resources and Services Administration (HRSA) of the U.S. Department of…
Jordan Keating
Jordan KeatingJune 19, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

Patching for Remote Users

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

O365 Configuration Considerations

With some healthcare organizations looking to facilitate an increased number of users working remotely, many…
Jordan Keating
Jordan KeatingJune 12, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Work From Home User Concerns

There has been a rise in cybercrime threats taking advantage of the current COVID-19 pandemic. …
Jordan Keating
Jordan KeatingJune 9, 2020
Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Remote Device Best Practices

Due to the current COVID-19 pandemic, many organizations have an increased number of users working…
Jordan Keating
Jordan KeatingJune 5, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Defending Against Remote Desktop Threats

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 2, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Providing Devices for Patient or Resident Use

In response to the COVID-19 pandemic, there has been a significant increase in the number…
Jordan Keating
Jordan KeatingMay 29, 2020
Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Voice Control Devices and Remote Work

Is My Smart Assistant Spying on Me? In response to minimizing the impact of COVID-19,…
Jordan Keating
Jordan KeatingMay 22, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

COVID-19 Resources and Topics

COVID-19 has brought on many changes to how everyone operates on a daily basis. The…
Jordan Keating
Jordan KeatingMay 20, 2020
NextPrevious »

Recent Posts

  • Don’t Forget about HIPAA Privacy!Law Requires HHS to Incentivize Security January 22, 2021
  • Top 5 Security Threats of 2020 and What You Can do About It January 15, 2021
  • The Designated Record Set January 14, 2021
  • OCR Cracking Down with HIPAA Right of Access Initiative January 7, 2021
  • The Importance of Multi-Factor Authentication December 30, 2020

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Risk Analysis Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • Comprehensive Security Risk Analysis
  • Expedient HIPAA Compliance
  • HIPAA Privacy, Breach and Security Solutions
  • OCR Audit Preparedness
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
    • OCR Audit Preparedness
      • Promoting Interoperability Programs
      • Passing an Audit
      • Audit Readiness Best Practices
  • HITRUST Compliance
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us