P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Access Control Archives | BlueOrange Compliance

CybersecurityHIPAAHIPAA Security

Focusing on the Importance of Access Control

The OCR defines Access Control, “The Access Control standard is a technical safeguard that requires…
Jordan Keating
Jordan KeatingFebruary 12, 2024
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

MFA – Cybersecurity Awareness Month

One of the topics being focused on for Cybersecurity Awareness Month is the importance of…
Jordan Keating
Jordan KeatingOctober 13, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Multifactor Authentication Security Reminder

This security reminder focuses on multifactor authentication (MFA) prompts that could mean a compromised password.…
Jordan Keating
Jordan KeatingJune 15, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Mobile Device Best Practices – Security Reminder

Some users may not work from mobile devices often and need a refresher on the…
Jordan Keating
Jordan KeatingFebruary 24, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Least Privilege

Least Privilege is put in place to limit the amount of information an individual has…
Jordan Keating
Jordan KeatingNovember 24, 2021
CybersecurityHIPAAHIPAA Security

The Ever-Rising Importance of Access Control

The OCR released their Summer Cybersecurity Newsletter highlighting the importance of Information Access Management and…
Jordan Keating
Jordan KeatingAugust 6, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Mobile Device Best Practices

Many organizations allow employees to use mobile devices for everything from email to logging patient…
Jordan Keating
Jordan KeatingMarch 16, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

“Position Risk Designation: What it is and how it keeps onboarding consistent”

If you’ve been involved with an organization’s security risk assessment you’ve probably heard “Position Risk…
Jordan Keating
Jordan KeatingSeptember 1, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Personnel Termination

Unfortunately, every organization has their fair share of terminations. The separation could be a retirement, or it…
Jordan Keating
Jordan KeatingAugust 28, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Personnel Transfers

Many organizations promote individual growth within the company. For instance, someone may be working as an Executive…
Jordan Keating
Jordan KeatingAugust 25, 2020
NextPrevious »

Recent Posts

  • Secure Our Future: Building Cyber Resilience for the Next Era of Care October 27, 2025
  • Secure Our Data: Protecting Healthcare Information in an Expanding Digital Ecosystem October 20, 2025
  • Expanding Your Protection: BlueOrange + CloudWave Strengthen Healthcare Cybersecurity October 15, 2025
  • How BlueOrange Compliance Uses Penetration Testing and Phishing Simulation to Strengthen Healthcare Cybersecurity October 15, 2025
  • Is Your HIPAA Security Risk Assessment Good Enough? October 15, 2025

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult