P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • Phishing Awareness Testing & Training
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult
Tag

Media Marking Archives - BlueOrange Compliance

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingAugust 30, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingOctober 5, 2021
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks – Reminder!

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminJuly 20, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

A Reminder to Keep Visitor Logs

As vaccines are rolling out and visitors start to enter facilities again, organizations should refamiliarize…
Jordan Keating
Jordan KeatingFebruary 26, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Do you know who is visiting your facilities?

If your organization is in long term care, you’re all too familiar with visitors coming…
Jordan Keating
Jordan KeatingSeptember 24, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks

So, now that we have explained how the attacker can get access, it’s time to…
BOCadmin
BOCadminSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

The Risks of Relay Authentication Attacks

What if we were to tell you that anyone connected to your network could simply…
BOCadmin
BOCadminSeptember 15, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Media Marking

When referencing the media marking requirement, media includes digital and physical media. Some examples are…
Jordan Keating
Jordan KeatingSeptember 9, 2020

Recent Posts

  • Hurricane Related Scams, again September 11, 2023
  • The Importance of Media Marking August 30, 2023
  • The Difference Between Vulnerability Scans and Penetration Tests August 17, 2023
  • Executive and C-Suite IT Security Buy-in July 28, 2023
  • Unsecured Server Results in $75k HHS Settlement July 12, 2023

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home


Copyright © 2023 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • Phishing Awareness Testing & Training
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult