P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

OCR Investigations Archives - Page 6 of 13 - BlueOrange Compliance

CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

DarkSide Ransomware Group

The ransomware group, DarkSide, has been getting a lot of attention due to their attack…
Jordan Keating
Jordan KeatingMay 21, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware

Industry Best Practices

To celebrate World Password Day we're sharing a post by our very own, Todd Skaggs,…
Jordan Keating
Jordan KeatingMay 6, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

The Ransomware Task Force is Calling for Action

A group of about 60 executives from major organizations (including Microsoft, Citrix, Cisco, and Palo…
Jordan Keating
Jordan KeatingMay 5, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Incident Response Training: Is Your Team Prepared?

Having an Incident Response Plan is definitely a priority for any organization. Once you have an outline of…
Jordan Keating
Jordan KeatingApril 30, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingApril 27, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

HIPAA’s Right of Access Initiative Isn’t Slowing Down

We have been following the OCR’s and HHS’ Right of Access Initiative over the past…
Jordan Keating
Jordan KeatingApril 20, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Security Awareness Training: What Should You be Covering?

All information system users in an organization need Security Awareness Training. Security Awareness Training should include training for…
Jordan Keating
Jordan KeatingMarch 31, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Adopt a Clean-Desk Policy

In a busy environment it can be very easy for staff to let clutter build…
Jordan Keating
Jordan KeatingMarch 26, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware

End User Phishing Reminder!

Take time to remind your end users on what to look for in phishing attempts!…
Jordan Keating
Jordan KeatingMarch 23, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Mobile Device Best Practices

Many organizations allow employees to use mobile devices for everything from email to logging patient…
Jordan Keating
Jordan KeatingMarch 16, 2021
« Previous
NextPrevious »

Recent Posts

  • Healthcare Prepares for Enhanced HIPAA Audits January 6, 2025
  • ORANGE ALERT – LDAPNightmare PoC Exploit for CVE-2024-49113/CVE-2024-49112 January 6, 2025
  • ORANGE ALERT – Palo Alto Patches Zero-Day November 22, 2024
  • ORANGE ALERT – Large Scale Spear-Phishing Campaign November 4, 2024
  • ORANGE ALERT – Fortinet Confirms Zero-Day Vulnerability October 27, 2024

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home


Copyright © 2024 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult