P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult
Category

Ethical Hacking

CybersecurityEthical HackingPenetration TestingPrivacy

Verizon’s 2022 Data Breach Investigation Report

Verizon has released their 2022 Data Breach Investigations Report! Verizon has been releasing an annual…
Jordan Keating
Jordan KeatingJuly 2, 2022
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJanuary 6, 2022
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks – Reminder!

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminJuly 20, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityPenetration TestingRansomware

Ransomware is Finally Getting the Necessary Attention

As many of us in the security field know, ransomware groups have been terrorizing people…
Jordan Keating
Jordan KeatingJune 29, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware

Top 5 Security Threats of 2020 and What You Can do About It

One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…
Jordan Keating
Jordan KeatingJanuary 15, 2021
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks

So, now that we have explained how the attacker can get access, it’s time to…
BOCadmin
BOCadminSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

The Risks of Relay Authentication Attacks

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminSeptember 15, 2020
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJuly 7, 2020

Recent Posts

  • EHR Optimization & Best Practices: Where are you on your EHR Journey? January 12, 2023
  • BOC ALERT | Windows 7, Windows 8.1, Server 2008 R2 No Longer Supported January 10, 2023
  • Software Supply Chain Security December 16, 2022
  • Security Reminder – Reporting Security Incidents December 9, 2022
  • The Benefits of a Password Manager November 17, 2022

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Webinar Work from home Workstation


Copyright © 2022 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult