P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Meaningful Use Archives | BlueOrange Compliance

COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

Patching for Remote Users

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

O365 Configuration Considerations

With some healthcare organizations looking to facilitate an increased number of users working remotely, many…
Jordan Keating
Jordan KeatingJune 12, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Work From Home User Concerns

There has been a rise in cybercrime threats taking advantage of the current COVID-19 pandemic. …
Jordan Keating
Jordan KeatingJune 9, 2020
Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Remote Device Best Practices

Due to the current COVID-19 pandemic, many organizations have an increased number of users working…
Jordan Keating
Jordan KeatingJune 5, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Defending Against Remote Desktop Threats

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 2, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Providing Devices for Patient or Resident Use

In response to the COVID-19 pandemic, there has been a significant increase in the number…
Jordan Keating
Jordan KeatingMay 29, 2020
Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Voice Control Devices and Remote Work

Is My Smart Assistant Spying on Me? In response to minimizing the impact of COVID-19,…
Jordan Keating
Jordan KeatingMay 22, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

COVID-19 Resources and Topics

COVID-19 has brought on many changes to how everyone operates on a daily basis. The…
Jordan Keating
Jordan KeatingMay 20, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

COVID Phishing and Ransomware

Wide-cast phishing and targeted spear phishing attacks are far from new threats to the healthcare…
Jordan Keating
Jordan KeatingMay 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Guidance for Patients & Residents Using Telehealth Services

Patients/Residents who are the recipients of telehealth services from their providers should consider the following…
Jordan Keating
Jordan KeatingMay 15, 2020
NextPrevious »

Recent Posts

  • December 2025 edition of CloudWave Connections December 30, 2025
  • December 2025 edition of BlueOrange Connections December 30, 2025
  • Closing the Gap Between Risk and Remediation in Healthcare December 11, 2025
  • BlueOrange Compliance Elevates Cybersecurity with NIST CSF 2.0: Strengthening Healthcare Security for What Comes Next December 8, 2025
  • MHS Association: The Gathering 2026 December 5, 2025

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult