P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • Phishing Awareness Testing & Training
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult
Tag

Privacy Archives - BlueOrange Compliance

CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA Security

HHS Resources

We have been calling our client’s attention to the HHS 405(d) Aligning Health Care Industry…
Jordan Keating
Jordan KeatingSeptember 2, 2022
COVID-19HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

Recent Telehealth Guidance from HHS

In March of 2020 OCR released the Notification of Enforcement Discretion for Telehealth to help…
Jordan Keating
Jordan KeatingJuly 8, 2022
CybersecurityEthical HackingPenetration TestingPrivacy

Verizon’s 2022 Data Breach Investigation Report

Verizon has released their 2022 Data Breach Investigations Report! Verizon has been releasing an annual…
Jordan Keating
Jordan KeatingJuly 2, 2022
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJanuary 6, 2022
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

With recent events around supply chain attacks we thought it would be a good idea…
Jordan Keating
Jordan KeatingMay 25, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJuly 7, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Must Haves in a Telework Policy

Many organizations have decided to keep working from home making it vital to have a…
Jordan Keating
Jordan KeatingJuly 3, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

Tracking your Business Associate Agreements (BAA) is important, but what information is important to document and…
Jordan Keating
Jordan KeatingJune 30, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Lost or Stolen Devices

Organizations have come to rely on a variety of mobile devices for daily operations, telehealth/telework…
Jordan Keating
Jordan KeatingJune 26, 2020
NextPrevious »

Recent Posts

  • Now Offering Phishing Awareness Testing & Training March 20, 2023
  • Right of Access Initiative Reaches 43 Settlements March 14, 2023
  • Mobile Device Best Practices – Security Reminder February 24, 2023
  • BlueOrange Client Sees a Decrease in Cyber Insurance Premium February 9, 2023
  • The Joint Cyber Defense Collaborative Announces it’s 2023 Planning Agenda February 3, 2023

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Webinar Work from home Workstation


Copyright © 2023 BlueOrange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Penetration Testing
    • Phishing Awareness Testing & Training
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult