P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Hipaa Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
Tag

Covered Entity Archives - Blue Orange Compliance

COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

COVID-19 Resources and Topics

COVID-19 has brought on many changes to how everyone operates on a daily basis. The…
Jordan Keating
Jordan KeatingMay 20, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

COVID Phishing and Ransomware

Wide-cast phishing and targeted spear phishing attacks are far from new threats to the healthcare…
Jordan Keating
Jordan KeatingMay 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Guidance for Patients & Residents Using Telehealth Services

Patients/Residents who are the recipients of telehealth services from their providers should consider the following…
Jordan Keating
Jordan KeatingMay 15, 2020
COVID-19CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Top 10 Routinely Exploited Vulnerabilities

Adapted from Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA), the…
Dan Lee
Dan LeeMay 14, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Telehealth and Patient Consent

We have recently received inquiries from several clients regarding obtaining patient consent, especially as it…
Jordan Keating
Jordan KeatingMay 8, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

The Unwavering Dedication of Nursing Home Workers

We are truly grateful for the dedication and self-sacrifice our community’s healthcare workers have shown…
Jordan Keating
Jordan KeatingMay 1, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

Implementing a Telehealth Policy During COVID-19

Due to the COVID-19 pandemic, healthcare providers are attempting to reduce their in-office visits for…
Jordan Keating
Jordan KeatingApril 22, 2020
COVID-19CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Phishing

There has been a rise in cybercrime threats taking advantage of the current COVID-19 pandemic. …
Dan Lee
Dan LeeApril 22, 2020
COVID-19HIPAAHIPAA SecurityHIPAA ViolationsPrivacy

Steps to Avoid Teleconference Hijacking

In response to the COVID-19 pandemic, there has been a significant increase in the number…
John DiMaggio
John DiMaggioApril 22, 2020
COVID-19HIPAAHIPAA SecurityHIPAA ViolationsSample Resources

A Teleworking Policy Is a Must During COVID-19

Having a Teleworking Policy Is a Must During COVID-19 In response to the COVID-19 pandemic,…
John DiMaggio
John DiMaggioApril 21, 2020
NextPrevious »

Recent Posts

  • HIPAA’s Right of Access Initiative Isn’t Slowing Down April 20, 2021
  • 21st Century Cures Act Final Rule Goes Into Effect April 7, 2021
  • Security Awareness Training: What Should You be Covering? March 31, 2021
  • Adopt a Clean-Desk Policy March 26, 2021
  • End User Phishing Reminder! March 23, 2021

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Hipaa Risk Assessment
  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Hipaa Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us