P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Problems We Solve
    • HIPAA Compliance
      • Organizational compliance
      • Comprehensive security risk analysis
      • Expedient HIPAA compliance
      • Post risk analysis
      • Common compliance gaps
    • HITRUST
      • Preparing for certification
      • Help with self-assessments
      • Validation for certification
    • Audit Readiness
      • OCR audit preparedness
      • Promoting Interoperability programs
      • Passing an audit
      • Audit readiness best practices
    • Cybersecurity
      • Ransomware Resilience Assessment
      • IT security
      • Security breach support
      • Technical testing
      • Cybersecurity best practices
  • Our Solutions
    • Our Approach
    • HIPAA Privacy, Breach & Security Solutions
    • HITRUST Practical Solutions
    • Cybersecurity
    • Penetration Testing
  • Why Us
    • Our Uniqueness
    • Testimonials
  • Resources
    • Blog
    • Resource Library
    • Case Studies
  • News & Events
    • News
    • Events
  • Contact Us
Tag

devices Archives - Blue Orange Compliance

HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Must Haves in a Telework Policy

Many organizations have decided to keep working from home making it vital to have a…
Jordan Keating
Jordan KeatingJuly 3, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

Tracking your Business Associate Agreements (BAA) is important, but what information is important to document and…
Jordan Keating
Jordan KeatingJune 30, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Lost or Stolen Devices

Organizations have come to rely on a variety of mobile devices for daily operations, telehealth/telework…
Jordan Keating
Jordan KeatingJune 26, 2020

Recent Posts

  • The Designated Record Set January 14, 2021
  • OCR Cracking Down with HIPAA Right of Access Initiative January 7, 2021
  • The Importance of Multi-Factor Authentication December 30, 2020
  • BOC Alert – SolarWinds Orion Platform SUNBURST Vulnerability December 22, 2020
  • Press Release: COVID-19 and Ransomware – a Nightmare Scenario That BlueOrange Compliance is Looking to Fix December 18, 2020

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Risk Analysis Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Organizational compliance
  • Comprehensive security risk analysis
  • Expedient HIPAA compliance
  • Post risk analysis
  • Common compliance gaps
  • Preparing for certification
  • Help with self-assessments
  • Validation for certification
  • OCR audit preparedness
  • Promoting interoperability programs
  • Passing an audit
  • Audit readiness best practices
  • IT security
  • Security breach support
  • Cybersecurity best practices

Our solutions

  • Our Approach
  • HIPAA Privacy, Breach & Security Solutions
  • HITRUST Practical Solutions
  • Cybersecurity
  • Penetration Testing

Resources

  • Events
  • News
  • Blog
  • Resource Library
  • Case Studies
  • Testimonials
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Problems We Solve
    • HIPAA Compliance
      • Organizational compliance
      • Comprehensive security risk analysis
      • Expedient HIPAA compliance
      • Post risk analysis
      • Common compliance gaps
    • HITRUST
      • Preparing for certification
      • Help with self-assessments
      • Validation for certification
    • Audit Readiness
      • OCR audit preparedness
      • Promoting Interoperability programs
      • Passing an audit
      • Audit readiness best practices
    • Cybersecurity
      • Ransomware Resilience Assessment
      • IT security
      • Security breach support
      • Technical testing
      • Cybersecurity best practices
  • Our Solutions
    • Our Approach
    • HIPAA Privacy, Breach & Security Solutions
    • HITRUST Practical Solutions
    • Cybersecurity
    • Penetration Testing
  • Why Us
    • Our Uniqueness
    • Testimonials
  • Resources
    • Blog
    • Resource Library
    • Case Studies
  • News & Events
    • News
    • Events
  • Contact Us