P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult
Category

HIPAA Violations

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Executive and C-Suite IT Security Buy-in

Many IT and IS departments are aware of the struggle of balancing budgets and getting…
Jordan Keating
Jordan KeatingMay 5, 2022
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

SAFER Guides: What You Need to Know

The Office of the National Coordinator for Health Information Technology (HealthIT) released the Safety Assurance…
Jordan Keating
Jordan KeatingFebruary 24, 2022
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Right of Access Initiative has Reached 25 Settlements

Over the past year we have followed OCR’s Right of Access Initiative. This initiative was…
Jordan Keating
Jordan KeatingJanuary 21, 2022
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

Upcoming Webinar: How Threat Actors are Gaining Access through Unresolved Log4Shell Vulnerabilities

We'd like to invite you and your security team to this month’s educational webinar, “How…
Jordan Keating
Jordan KeatingJanuary 13, 2022
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJanuary 6, 2022
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Policy and Procedure Review Reminder

Some organizations have their annual policy review date already set and others might have a…
Jordan Keating
Jordan KeatingDecember 29, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Least Privilege

Least Privilege is put in place to limit the amount of information an individual has…
Jordan Keating
Jordan KeatingNovember 24, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Terminating User Accounts

When BlueOrange is performing security assessments we have a lot of discussion around access controls.…
Jordan Keating
Jordan KeatingNovember 18, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingOctober 5, 2021
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

The Secure Disposal of PHI

While often times we work with Security Officers when it comes to the protection of…
Jordan Keating
Jordan KeatingSeptember 16, 2021
NextPrevious »

Recent Posts

  • The BlueOrange Project Coordinators May 18, 2022
  • The BlueOrange Security Analysts May 13, 2022
  • Executive and C-Suite IT Security Buy-in May 5, 2022
  • Reminder of CISA’s Vulnerability Catalog May 2, 2022
  • The PATCH Act of 2022 Introduced April 15, 2022

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Webinar Work from home Workstation


Copyright © 2021 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult