P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
    • OCR Audit Preparedness
      • Promoting Interoperability Programs
      • Passing an Audit
      • Audit Readiness Best Practices
  • HITRUST Compliance
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
Tag

PHI Archives - Blue Orange Compliance

CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsHITRUSTPrivacy

Law Requires HHS to Incentivize Security

Cyberattacks against healthcare entities have risen a massive 45 percent, according to Fortified Health Security,…
Jordan Keating
Jordan KeatingJanuary 22, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware

Top 5 Security Threats of 2020 and What You Can do About It

One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…
Jordan Keating
Jordan KeatingJanuary 15, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

The Designated Record Set

In one of our last blog posts we discussed the HIPAA Privacy Rule’s Right to…
Jordan Keating
Jordan KeatingJanuary 14, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

OCR Cracking Down with HIPAA Right of Access Initiative

“OCR Cracking Down with HIPAA Right of Access Initiative”  The OCR has now settled 13 investigations (HHS News) as…
Jordan Keating
Jordan KeatingJanuary 7, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware

The Importance of Multi-Factor Authentication

There has been a huge push for organizations to implement multi-factor authentication (MFA) in their…
Jordan Keating
Jordan KeatingDecember 30, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

BOC Alert – SolarWinds Orion Platform SUNBURST Vulnerability

Over the past week, CISA, CERT and SolarWinds has released Security Advisories regarding the cyberattack…
Jordan Keating
Jordan KeatingDecember 22, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

Press Release: COVID-19 and Ransomware – a Nightmare Scenario That BlueOrange Compliance is Looking to Fix

Here is our latest press release on our new Ransomware Resilience product! The COVID-19 pandemic…
Jordan Keating
Jordan KeatingDecember 18, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware

Phishing Attempts on the Rise

We’ve talked a lot about ransomware attacks as they continue to make their way through…
Jordan Keating
Jordan KeatingDecember 11, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

Mitigating the Password Spray Threat: Stopping Modern Hacks

Join us for our webinar this week, December 3rd at 1PM EST, on Mitigating the Password Spray Threat: Stopping Modern…
Jordan Keating
Jordan KeatingDecember 2, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware

As Ransomware Attacks Increase So Should Preparedness

We’ve seen an uptick in ransomware attacks recently making organizations assess their Incident Response (IR) procedures. Many organization’s will rely on…
Jordan Keating
Jordan KeatingNovember 25, 2020
NextPrevious »

Recent Posts

  • Don’t Forget about HIPAA Privacy!Law Requires HHS to Incentivize Security January 22, 2021
  • Top 5 Security Threats of 2020 and What You Can do About It January 15, 2021
  • The Designated Record Set January 14, 2021
  • OCR Cracking Down with HIPAA Right of Access Initiative January 7, 2021
  • The Importance of Multi-Factor Authentication December 30, 2020

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Long Term Care Meaningful Use Media Marking NIST OCR OCR Investigations Office for Civil Rights Patient Consent Penetration Testing Pen Testing Personnel Screening PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Risk Analysis Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Virtual Visits Visitors Voice Control Device Work from home


Copyright © 2020 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • Comprehensive Security Risk Analysis
  • Expedient HIPAA Compliance
  • HIPAA Privacy, Breach and Security Solutions
  • OCR Audit Preparedness
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Schedule a Demo

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • Organizational Compliance
    • Comprehensive Security Risk Analysis
    • Expedient HIPAA Compliance
    • Post Risk Analysis
    • Common Compliance Gaps
    • HIPAA Privacy, Breach & Security Solutions
    • OCR Audit Preparedness
      • Promoting Interoperability Programs
      • Passing an Audit
      • Audit Readiness Best Practices
  • HITRUST Compliance
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us