P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Category

Ethical Hacking

CybersecurityEthical HackingHIPAAHIPAA Privacy ComplianceHIPAA SecurityPenetration Testing

Penetration Testing for Healthcare Cyber Security 

Penetration testing is part of a comprehensive cyber security strategy. Learn how RiverSpring Living partnered…
Melany Joy Beck
Melany Joy BeckJuly 14, 2024
CybersecurityEthical HackingHIPAA SecurityPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingAugust 17, 2023
CybersecurityEthical HackingPenetration TestingPrivacy

Verizon’s 2022 Data Breach Investigation Report

Verizon has released their 2022 Data Breach Investigations Report! Verizon has been releasing an annual…
Jordan Keating
Jordan KeatingJuly 2, 2022
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJanuary 6, 2022
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks – Reminder!

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminJuly 20, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityPenetration TestingRansomware

Ransomware is Finally Getting the Necessary Attention

As many of us in the security field know, ransomware groups have been terrorizing people…
Jordan Keating
Jordan KeatingJune 29, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware

Top 5 Security Threats of 2020 and What You Can do About It

One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…
Jordan Keating
Jordan KeatingJanuary 15, 2021
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks

So, now that we have explained how the attacker can get access, it’s time to…
BOCadmin
BOCadminSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

The Risks of Relay Authentication Attacks

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminSeptember 15, 2020
NextPrevious »

Recent Posts

  • Healthcare Prepares for Enhanced HIPAA Audits January 6, 2025
  • ORANGE ALERT – LDAPNightmare PoC Exploit for CVE-2024-49113/CVE-2024-49112 January 6, 2025
  • ORANGE ALERT – Palo Alto Patches Zero-Day November 22, 2024
  • ORANGE ALERT – Large Scale Spear-Phishing Campaign November 4, 2024
  • ORANGE ALERT – Fortinet Confirms Zero-Day Vulnerability October 27, 2024

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home


Copyright © 2024 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult