P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Problems We Solve
    • HIPAA Compliance
      • Organizational compliance
      • Comprehensive security risk analysis
      • Expedient HIPAA compliance
      • Post risk analysis
      • Common compliance gaps
    • HITRUST
      • Preparing for certification
      • Help with self-assessments
      • Validation for certification
    • Audit Readiness
      • OCR audit preparedness
      • Promoting Interoperability programs
      • Passing an audit
      • Audit readiness best practices
    • Cybersecurity
      • Ransomware Resilience Assessment
      • IT security
      • Security breach support
      • Technical testing
      • Cybersecurity best practices
  • Our Solutions
    • Our Approach
    • HIPAA Privacy, Breach & Security Solutions
    • HITRUST Practical Solutions
    • Cybersecurity
    • Penetration Testing
  • Why Us
    • Our Uniqueness
    • Testimonials
  • Resources
    • Blog
    • Resource Library
    • Case Studies
  • News & Events
    • News
    • Events
  • Contact Us
Tag

Encryption Archives - Blue Orange Compliance

CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware

The Importance of Multi-Factor Authentication

There has been a huge push for organizations to implement multi-factor authentication (MFA) in their…
Jordan Keating
Jordan KeatingDecember 30, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

BOC Alert – SolarWinds Orion Platform SUNBURST Vulnerability

Over the past week, CISA, CERT and SolarWinds has released Security Advisories regarding the cyberattack…
Jordan Keating
Jordan KeatingDecember 22, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware

Phishing Attempts on the Rise

We’ve talked a lot about ransomware attacks as they continue to make their way through…
Jordan Keating
Jordan KeatingDecember 11, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

Mitigating the Password Spray Threat: Stopping Modern Hacks

Join us for our webinar this week, December 3rd at 1PM EST, on Mitigating the Password Spray Threat: Stopping Modern…
Jordan Keating
Jordan KeatingDecember 2, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

As Ransomware Attacks Increase So Should Preparedness

We’ve seen an uptick in ransomware attacks recently making organizations assess their Incident Response (IR) procedures. Many organization’s will rely on…
Jordan Keating
Jordan KeatingNovember 25, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Terminating User Accounts

When BlueOrange is performing security assessments we have a lot of discussion around access controls.…
Jordan Keating
Jordan KeatingNovember 19, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Risk Analysis and Management is Worth It

$6.85 million dollars is one of the OCR’s latest settlement amounts against a health insurer. After an…
Jordan Keating
Jordan KeatingNovember 4, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Where is your organization’s data?

Our blogs have covered the importance of keeping hardware and software secure. That can be…
Jordan Keating
Jordan KeatingOctober 9, 2020

Recent Posts

  • The Designated Record Set January 14, 2021
  • OCR Cracking Down with HIPAA Right of Access Initiative January 7, 2021
  • The Importance of Multi-Factor Authentication December 30, 2020
  • BOC Alert – SolarWinds Orion Platform SUNBURST Vulnerability December 22, 2020
  • Press Release: COVID-19 and Ransomware – a Nightmare Scenario That BlueOrange Compliance is Looking to Fix December 18, 2020

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Risk Analysis Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Organizational compliance
  • Comprehensive security risk analysis
  • Expedient HIPAA compliance
  • Post risk analysis
  • Common compliance gaps
  • Preparing for certification
  • Help with self-assessments
  • Validation for certification
  • OCR audit preparedness
  • Promoting interoperability programs
  • Passing an audit
  • Audit readiness best practices
  • IT security
  • Security breach support
  • Cybersecurity best practices

Our solutions

  • Our Approach
  • HIPAA Privacy, Breach & Security Solutions
  • HITRUST Practical Solutions
  • Cybersecurity
  • Penetration Testing

Resources

  • Events
  • News
  • Blog
  • Resource Library
  • Case Studies
  • Testimonials
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Problems We Solve
    • HIPAA Compliance
      • Organizational compliance
      • Comprehensive security risk analysis
      • Expedient HIPAA compliance
      • Post risk analysis
      • Common compliance gaps
    • HITRUST
      • Preparing for certification
      • Help with self-assessments
      • Validation for certification
    • Audit Readiness
      • OCR audit preparedness
      • Promoting Interoperability programs
      • Passing an audit
      • Audit readiness best practices
    • Cybersecurity
      • Ransomware Resilience Assessment
      • IT security
      • Security breach support
      • Technical testing
      • Cybersecurity best practices
  • Our Solutions
    • Our Approach
    • HIPAA Privacy, Breach & Security Solutions
    • HITRUST Practical Solutions
    • Cybersecurity
    • Penetration Testing
  • Why Us
    • Our Uniqueness
    • Testimonials
  • Resources
    • Blog
    • Resource Library
    • Case Studies
  • News & Events
    • News
    • Events
  • Contact Us