P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • OCR Audit Prep
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
Category

HIPAA Violations

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

A Reminder to Keep Visitor Logs

As vaccines are rolling out and visitors start to enter facilities again, organizations should refamiliarize…
Jordan Keating
Jordan KeatingFebruary 26, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware

Password Complexity Reminder!

As we round the bend of winter and head into spring, it’s a good time…
Jordan Keating
Jordan KeatingFebruary 19, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Secure Disposal of PHI

While often times we work with Security Officers when it comes to the protection of…
Jordan Keating
Jordan KeatingFebruary 16, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Upcoming Webinar: Analyzing the OCR HIPAA Settlements of 2020 – Tips, Pitfalls, and What To Avoid

Join us for our upcoming educational webinar, “Analyzing the OCR HIPAA Settlements of 2020 -…
Jordan Keating
Jordan KeatingFebruary 13, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware

The Risks of Shared Passwords

Passwords are what we use to protect access to systems or tools and in the…
Jordan Keating
Jordan KeatingFebruary 9, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

BOC Alert: SonicWall Zero-Day Vulnerability

What started as an unconfirmed SonicWall vulnerability has now been confirmed by the Cybersecurity &…
Jordan Keating
Jordan KeatingFebruary 5, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

HIPAA’s Minimum Necessary Requirement

The HIPAA Privacy Rules requires organizations to limit the use and disclosure of, and requests…
Jordan Keating
Jordan KeatingFebruary 2, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

5.1 Million Dollar Settlement for Data Breach

The Excellus Health Plan (EHP) data breach from September 2015 has been investigated and an…
Jordan Keating
Jordan KeatingJanuary 26, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsHITRUSTPrivacy

Law Requires HHS to Incentivize Security

Cyberattacks against healthcare entities have risen a massive 45 percent, according to Fortified Health Security,…
Jordan Keating
Jordan KeatingJanuary 22, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware

Top 5 Security Threats of 2020 and What You Can do About It

One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…
Jordan Keating
Jordan KeatingJanuary 15, 2021
NextPrevious »

Recent Posts

  • Penetration Testing with BlueOrange March 3, 2021
  • A Reminder to Keep Visitor Logs February 26, 2021
  • Password Complexity Reminder! February 19, 2021
  • Secure Disposal of PHI February 16, 2021
  • Upcoming Webinar: Analyzing the OCR HIPAA Settlements of 2020 – Tips, Pitfalls, and What To Avoid February 13, 2021

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • Comprehensive Security Risk Analysis
  • Expedient HIPAA Compliance
  • HIPAA Privacy, Breach and Security Solutions
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • OCR Audit Prep
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us