P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • OCR Audit Prep
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
Category

Penetration Testing

CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware

Top 5 Security Threats of 2020 and What You Can do About It

One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…
Jordan Keating
Jordan KeatingJanuary 15, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishing

Types of Phishing

Phishing attempts can come in all sorts of shapes and sizes. It can be attempted…
Jordan Keating
Jordan KeatingJuly 10, 2020
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJuly 7, 2020
Penetration Testing

Healthcare IT Security- The Case For Penetration Testing

HIPAA law requires covered entities to safeguard against “reasonably anticipated” threats to protected health information. With…
John DiMaggio
John DiMaggioMay 27, 2019

Recent Posts

  • BOC Alert: Microsoft Exchange Server Zero-Day Vulnerability March 5, 2021
  • Penetration Testing with BlueOrange March 3, 2021
  • A Reminder to Keep Visitor Logs February 26, 2021
  • Password Complexity Reminder! February 19, 2021
  • Secure Disposal of PHI February 16, 2021

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • Comprehensive Security Risk Analysis
  • Expedient HIPAA Compliance
  • HIPAA Privacy, Breach and Security Solutions
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • OCR Audit Prep
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us