P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

OCR Investigations Archives - Page 10 of 13 - BlueOrange Compliance

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Monitoring Secure Areas in your Environment

No matter the type of organization, it is important to monitor visitors that are coming…
Jordan Keating
Jordan KeatingAugust 5, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Security Awareness Training: What Should You be Covering?

All information system users in an organization need Security Awareness Training. Security Awareness Training should include training for…
Jordan Keating
Jordan KeatingJuly 29, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Access for Mobile Devices

In today’s blog post we’re going to cover the NIST control AC-19, Access Control for…
Jordan Keating
Jordan KeatingJuly 24, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Least Privilege

Today we’re reviewing the Least Privilege NIST control that is part of the Access Control Family.    Least…
Jordan Keating
Jordan KeatingJuly 22, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Separation of Duties, cont.

We’re continuing our discussion from the previous blog post, “The Importance of Separation of Duties”,…
Jordan Keating
Jordan KeatingJuly 17, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Separation of Duties

We’re going to review the Separation of Duties control (AC-05) that is under the NIST Access Control Control Family.   A…
Jordan Keating
Jordan KeatingJuly 14, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishing

Types of Phishing

Phishing attempts can come in all sorts of shapes and sizes. It can be attempted…
Jordan Keating
Jordan KeatingJuly 10, 2020
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJuly 7, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Must Haves in a Telework Policy

Many organizations have decided to keep working from home making it vital to have a…
Jordan Keating
Jordan KeatingJuly 3, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

Tracking your Business Associate Agreements (BAA) is important, but what information is important to document and…
Jordan Keating
Jordan KeatingJune 30, 2020
« Previous
NextPrevious »

Recent Posts

  • Healthcare Prepares for Enhanced HIPAA Audits January 6, 2025
  • ORANGE ALERT – LDAPNightmare PoC Exploit for CVE-2024-49113/CVE-2024-49112 January 6, 2025
  • ORANGE ALERT – Palo Alto Patches Zero-Day November 22, 2024
  • ORANGE ALERT – Large Scale Spear-Phishing Campaign November 4, 2024
  • ORANGE ALERT – Fortinet Confirms Zero-Day Vulnerability October 27, 2024

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home


Copyright © 2024 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult