P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News & Events
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

PHI Archives | Page 2 of 18 | BlueOrange Compliance

CybersecurityHIPAAHIPAA SecurityHIPAA Violations

The Importance of Media Marking

Media marking in an organization’s environment is important to be able to identify what media…
Jordan Keating
Jordan KeatingAugust 30, 2023
CybersecurityEthical HackingHIPAA SecurityPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingAugust 17, 2023
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Unsecured Server Results in $75k HHS Settlement

Recently HHS released a statement saying they had settled a $75,000 dollar investigation into an…
Jordan Keating
Jordan KeatingJuly 12, 2023
CybersecurityHIPAAHIPAA SecurityRansomware

Baseboard Management Controller Security

Recently CISA and NSA released a joint Information Sheet that details how to mitigate threats…
Jordan Keating
Jordan KeatingJune 29, 2023
CybersecurityHIPAAHIPAA Security

Reminder of CISA’s Vulnerability Catalog

Quick reminder that CISA maintains a catalog of known exploited vulnerabilities that is available to…
Jordan Keating
Jordan KeatingJune 9, 2023
CybersecurityRansomware

Tracking Technologies and Cyber-Insurance

We have seen tracking technologies addressed by HHS in the past. (Find HHS’ article on…
Jordan Keating
Jordan KeatingMay 19, 2023
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA Security

HHS Resources

We have been calling our client’s attention to the HHS 405(d) Aligning Health Care Industry…
Jordan Keating
Jordan KeatingMay 2, 2023
CybersecurityHIPAAHIPAA SecurityPhishingRansomware

Penetration Testing with BlueOrange, Part 2

CHALLENGE Cyber attacks are increasing year over year and with cyber criminals gaining sophistication, traditional…
Jordan Keating
Jordan KeatingApril 20, 2023
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Notifications of Enforcement Discretion Set to Expire

This week OCR announced that the Notifications of Enforcement Discretion that was issued under the…
Jordan Keating
Jordan KeatingApril 14, 2023
CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Access Agreements Should be Required

Access agreements are a must when bringing anyone into your organization. Requiring a signature on…
Jordan Keating
Jordan KeatingMarch 31, 2023
« Previous
NextPrevious »

Recent Posts

  • February 2026 edition of BlueOrange Connections March 3, 2026
  • February 2026 edition of CloudWave Connections March 3, 2026
  • Why Q1 is the Strategic Window for Completing a HIPAA Security Risk Assessment February 19, 2026
  • Webinar – Building Resilience: Practical Steps for Healthcare Leaders to Mitigate Cyber Risk February 18, 2026
  • Beyond the Balance Sheet: Why Cybersecurity is the Heart of Healthcare M&A February 9, 2026

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News & Events
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult