P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Covered Entity Archives | BlueOrange Compliance

COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

COVID-19 Resources and Topics

COVID-19 has brought on many changes to how everyone operates on a daily basis. The…
Jordan Keating
Jordan KeatingMay 20, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

COVID Phishing and Ransomware

Wide-cast phishing and targeted spear phishing attacks are far from new threats to the healthcare…
Jordan Keating
Jordan KeatingMay 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Guidance for Patients & Residents Using Telehealth Services

Patients/Residents who are the recipients of telehealth services from their providers should consider the following…
Jordan Keating
Jordan KeatingMay 15, 2020
COVID-19CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Top 10 Routinely Exploited Vulnerabilities

Adapted from Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA), the…
Joan Elewski
Joan ElewskiMay 14, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Telehealth and Patient Consent

We have recently received inquiries from several clients regarding obtaining patient consent, especially as it…
Jordan Keating
Jordan KeatingMay 8, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

The Unwavering Dedication of Nursing Home Workers

We are truly grateful for the dedication and self-sacrifice our community’s healthcare workers have shown…
Jordan Keating
Jordan KeatingMay 1, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

Implementing a Telehealth Policy During COVID-19

Due to the COVID-19 pandemic, healthcare providers are attempting to reduce their in-office visits for…
Jordan Keating
Jordan KeatingApril 22, 2020
COVID-19CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Phishing

There has been a rise in cybercrime threats taking advantage of the current COVID-19 pandemic. …
Joan Elewski
Joan ElewskiApril 22, 2020
COVID-19HIPAAHIPAA SecurityHIPAA ViolationsPrivacy

Steps to Avoid Teleconference Hijacking

In response to the COVID-19 pandemic, there has been a significant increase in the number…
Joan Elewski
Joan ElewskiApril 22, 2020
COVID-19HIPAAHIPAA SecurityHIPAA ViolationsSample Resources

A Teleworking Policy Is a Must During COVID-19

Having a Teleworking Policy Is a Must During COVID-19 In response to the COVID-19 pandemic,…
Joan Elewski
Joan ElewskiApril 21, 2020
NextPrevious »

Recent Posts

  • December 2025 edition of CloudWave Connections December 30, 2025
  • December 2025 edition of BlueOrange Connections December 30, 2025
  • Closing the Gap Between Risk and Remediation in Healthcare December 11, 2025
  • BlueOrange Compliance Elevates Cybersecurity with NIST CSF 2.0: Strengthening Healthcare Security for What Comes Next December 8, 2025
  • MHS Association: The Gathering 2026 December 5, 2025

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult