P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

Blue Orange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult
Tag

Privacy Archives - Blue Orange Compliance

CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

The Difference Between Vulnerability Scans and Penetration Tests

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJanuary 6, 2022
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

With recent events around supply chain attacks we thought it would be a good idea…
Jordan Keating
Jordan KeatingMay 25, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing

Vulnerability Scans and Penetration Tests: What’s the Difference?

We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…
Jordan Keating
Jordan KeatingJuly 7, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Must Haves in a Telework Policy

Many organizations have decided to keep working from home making it vital to have a…
Jordan Keating
Jordan KeatingJuly 3, 2020
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Top 3 Items for your Business Associate Agreement Tracker

Tracking your Business Associate Agreements (BAA) is important, but what information is important to document and…
Jordan Keating
Jordan KeatingJune 30, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Lost or Stolen Devices

Organizations have come to rely on a variety of mobile devices for daily operations, telehealth/telework…
Jordan Keating
Jordan KeatingJune 26, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Reminders for Providers on HIPAA regarding Obtaining Consent and Notice of Privacy Practices

Reminders for Providers on HIPAA regarding Obtaining Consent and Notice of Privacy Practices:   The Department…
Jordan Keating
Jordan KeatingJune 23, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

FAQs on Telehealth and HIPAA During COVID-19

What is telehealth?    The Health Resources and Services Administration (HRSA) of the U.S. Department of…
Jordan Keating
Jordan KeatingJune 19, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations

Patching for Remote Users

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 16, 2020
NextPrevious »

Recent Posts

  • The BlueOrange Offensive Security Analyst June 24, 2022
  • Security Reminder – Physical Security June 9, 2022
  • BOC ALERT | MSDT “Follina” Vulnerability June 2, 2022
  • The BlueOrange Project Coordinators May 18, 2022
  • The BlueOrange Security Analysts May 13, 2022

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Relay Attacks Right to Access Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Webinar Work from home Workstation


Copyright © 2021 Blue Orange Compliance.
All Rights Reserved.

info@blueorangecompliance.com
855-500-6272

 

Follow Us

  • LinkedIn

Problems we solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Ransomware Resilience Assessment
  • Penetration Testing
  • OCR Audit Prep
  • HITRUST Compliance

Our solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resource Library
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Ransomware Resilience Assessment
    • Penetration Testing
    • IT security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
    • HITRUST Practical Solutions
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Testimonials
    • Commonly Asked Questions
  • Resources
    • Blog
    • Case Studies
    • Resource Library
  • Contact Us
    • Request A Consult