Pages
- Alliance Community Hospital
- Are you prepared for an OCR Investigation?
- Are you prepared for Promoting Interoperability Programs?
- Are you ready for an OCR Investigation
- Audit Readiness
- Blog
- BlueOrange Achieves HITRUST CSF Assessor Designation
- BlueOrange Announces Co-Authorship of Cybersecurity Whitepaper
- BlueOrange Announces Slice® Analytics Dashboard
- BlueOrange Incorporates NIST Cybersecurity Framework Standards into all HIPAA Security Services
- BlueOrange Introduces Full Array of Cybersecurity Services
- BlueOrange Introduces New HIPAA Privacy Services
- BlueOrange Introduces New Penetration Testing Services
- BlueOrange offers 8 tips for smart strategies with smart devices
- Case Studies
- Contact Us
- Cyber Security
- Cybersecurity Solutions
- Do you know how to manage an OCR Investigation?
- HIPAA Compliance
- HIPAA Privacy, Breach & Security Solutions
- Hipaa Risk Assessment
- HITRUST Practical Solutions
- Home
- implementation of HIPAA compliance
- Investigation Support Solutions
- Is your environment secure?
- Is your HIPAA security risk analysis adequate?
- Is your organization an easy target for a cyber-attack?
- Is your organization compliant with HIPAA Privacy, Breach and Security Regulations?
- Mather LifeWays
- Miami Jewish Health Systems
- News
- Northwestern Medical Center
- OCR Audit Prep
- Our Approach
- Penetration Testing
- Problems We Solve
- Ransomware Resilience Assessment
- Ransomware Resilience Compliance PPC
- Ready to Get Started – Thank You
- Remedi SeniorCare
- Resource Library
- RiverSpring Health
- Security Event Information Management Solutions
- Sitemap
- Technical Testing Solutions
- Testimonials
- Thank You for Contacting Us for a Free Consultation!
- Thank You for Contacting Us to Help Start Solving Your Problem!
- Training Solutions
- Upcoming Trade Shows & Speaking Events
- What if your organization has a security breach?
- Why Us
- You probably have some compliance gaps but don’t know where to start
- You’ve done a risk analysis…what’s next?
Posts
- Healthcare IT Security- The Case For Penetration Testing
- Healthcare IT Cybersecurity
- Could Your Organization be the Next Ransomware Victim?
- Alexa in Senior Care Settings: HIPAA Considerations and Safeguards
- DiMaggio, Other Cybersecurity All-Stars Address Risks, Solutions at HIT Summit
- Your 6-Point Guide to Addressing Individuals Rights Under the HIPAA Privacy Rule
- Business Associates (BAs) are Essential to Healthcare Organizations
- Are You Ready for a Cyberattack? A Tabletop Test Can Tell
- Are Your Business Associates HIPAA Compliant?
- Notice of Privacy Practices
- Don’t Get Hooked by Phishing Attacks
- Business Email Compromise (BEC) – A Fast-Growing Scam!
- Fine on Mobile Device Loss in the Millions
- How Often Do I need a Security Risk Assessment?
- Office for Civil Rights fines Dental Practice for HIPAA Violation
- Don’t Forget About HIPAA Privacy!
- Annual OCR Breach Reporting Deadline Sneaking Up
- Are Your HIPAA Security Risk Analyses Good Enough?
- A Teleworking Policy Is a Must During COVID-19
- Steps to Avoid Teleconference Hijacking
- Phishing
- Implementing a Telehealth Policy During COVID-19
- The Unwavering Dedication of Nursing Home Workers
- Telehealth and Patient Consent
- Top 10 Routinely Exploited Vulnerabilities
- Guidance for Patients & Residents Using Telehealth Services
- COVID Phishing and Ransomware
- COVID-19 Resources and Topics
- Voice Control Devices and Remote Work
- Providing Devices for Patient or Resident Use
- Defending Against Remote Desktop Threats
- Remote Device Best Practices
- Work From Home User Concerns
- O365 Configuration Considerations
- Patching for Remote Users
- FAQs on Telehealth and HIPAA During COVID-19
- Lost or Stolen Devices
- Top 3 Items for your Business Associate Agreement Tracker
- Must Haves in a Telework Policy
- Vulnerability Scans and Penetration Tests: What’s the Difference?
- Types of Phishing
- The Importance of Separation of Duties
- The Importance of Separation of Duties, cont.
- Least Privilege
- Access for Mobile Devices
- Security Awareness Training: What Should You be Covering?
- Monitoring Secure Areas in your Environment
- Incident Response Training: Is Your Team Prepared?
- Personnel Screening
- Access Agreements
- Personnel Transfers
- Personnel Termination
- “Position Risk Designation: What it is and how it keeps onboarding consistent”
- Media Sanitization
- Media Marking
- The Risks of Relay Authentication Attacks
- Mitigating the Risks of Relay Authentication Attacks
- Do you know who is visiting your facilities?
- The Impact of a Breach
- Where is your organization’s data?
- Policy and Procedure Review
- National Cybersecurity Awareness Month
- Ransomware Advisory
- Risk Analysis and Management is Worth It
- Terminating User Accounts
- As Ransomware Attacks Increase So Should Preparedness
- Mitigating the Password Spray Threat: Stopping Modern Hacks
- Phishing Attempts on the Rise
- Press Release: COVID-19 and Ransomware – a Nightmare Scenario That BlueOrange Compliance is Looking to Fix
- BOC Alert – SolarWinds Orion Platform SUNBURST Vulnerability
- The Importance of Multi-Factor Authentication
- OCR Cracking Down with HIPAA Right of Access Initiative
- The Designated Record Set
- Top 5 Security Threats of 2020 and What You Can do About It
- Law Requires HHS to Incentivize Security
- 5.1 Million Dollar Settlement for Data Breach
- HIPAA’s Minimum Necessary Requirement
- BOC Alert: SonicWall Zero-Day Vulnerability
- The Risks of Shared Passwords
- Upcoming Webinar: Analyzing the OCR HIPAA Settlements of 2020 – Tips, Pitfalls, and What To Avoid
- Secure Disposal of PHI
- Password Complexity Reminder!
- A Reminder to Keep Visitor Logs
- Penetration Testing with BlueOrange
- BOC Alert: Microsoft Exchange Server Zero-Day Vulnerability