P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News & Events
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Privacy Archives | Page 3 of 5 | BlueOrange Compliance

Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Remote Device Best Practices

Due to the current COVID-19 pandemic, many organizations have an increased number of users working…
Jordan Keating
Jordan KeatingJune 5, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Defending Against Remote Desktop Threats

During the COVID-19 pandemic, many organizations have implemented various policies and procedures to allow some…
Jordan Keating
Jordan KeatingJune 2, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Providing Devices for Patient or Resident Use

In response to the COVID-19 pandemic, there has been a significant increase in the number…
Jordan Keating
Jordan KeatingMay 29, 2020
Alexa ComplianceCOVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Voice Control Devices and Remote Work

Is My Smart Assistant Spying on Me? In response to minimizing the impact of COVID-19,…
Jordan Keating
Jordan KeatingMay 22, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacySample Resources

COVID-19 Resources and Topics

COVID-19 has brought on many changes to how everyone operates on a daily basis. The…
Jordan Keating
Jordan KeatingMay 20, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

COVID Phishing and Ransomware

Wide-cast phishing and targeted spear phishing attacks are far from new threats to the healthcare…
Jordan Keating
Jordan KeatingMay 16, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Guidance for Patients & Residents Using Telehealth Services

Patients/Residents who are the recipients of telehealth services from their providers should consider the following…
Jordan Keating
Jordan KeatingMay 15, 2020
COVID-19CybersecurityHIPAAHIPAA SecurityHIPAA Violations

Top 10 Routinely Exploited Vulnerabilities

Adapted from Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA), the…
Joan Elewski
Joan ElewskiMay 14, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

Telehealth and Patient Consent

We have recently received inquiries from several clients regarding obtaining patient consent, especially as it…
Jordan Keating
Jordan KeatingMay 8, 2020
COVID-19CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy

The Unwavering Dedication of Nursing Home Workers

We are truly grateful for the dedication and self-sacrifice our community’s healthcare workers have shown…
Jordan Keating
Jordan KeatingMay 1, 2020
« Previous
NextPrevious »

Recent Posts

  • February 2026 edition of BlueOrange Connections March 3, 2026
  • February 2026 edition of CloudWave Connections March 3, 2026
  • Why Q1 is the Strategic Window for Completing a HIPAA Security Risk Assessment February 19, 2026
  • Webinar – Building Resilience: Practical Steps for Healthcare Leaders to Mitigate Cyber Risk February 18, 2026
  • Beyond the Balance Sheet: Why Cybersecurity is the Heart of Healthcare M&A February 9, 2026

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News & Events
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult