P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Media Marking Archives | BlueOrange Compliance

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingAugust 30, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingOctober 5, 2021
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks – Reminder!

What if we were to tell you that anyone connected to your network could simply…
Joan Elewski
Joan ElewskiJuly 20, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

A Reminder to Keep Visitor Logs

As vaccines are rolling out and visitors start to enter facilities again, organizations should refamiliarize…
Jordan Keating
Jordan KeatingFebruary 26, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Do you know who is visiting your facilities?

If your organization is in long term care, you’re all too familiar with visitors coming…
Jordan Keating
Jordan KeatingSeptember 24, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks

So, now that we have explained how the attacker can get access, it’s time to…
Joan Elewski
Joan ElewskiSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

The Risks of Relay Authentication Attacks

What if we were to tell you that anyone connected to your network could simply…
Joan Elewski
Joan ElewskiSeptember 15, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Media Marking

When referencing the media marking requirement, media includes digital and physical media. Some examples are…
Jordan Keating
Jordan KeatingSeptember 9, 2020

Recent Posts

  • Secure Our Future: Building Cyber Resilience for the Next Era of Care October 27, 2025
  • Secure Our Data: Protecting Healthcare Information in an Expanding Digital Ecosystem October 20, 2025
  • Expanding Your Protection: BlueOrange + CloudWave Strengthen Healthcare Cybersecurity October 15, 2025
  • How BlueOrange Compliance Uses Penetration Testing and Phishing Simulation to Strengthen Healthcare Cybersecurity October 15, 2025
  • Is Your HIPAA Security Risk Assessment Good Enough? October 15, 2025

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult