P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

BlueOrange Compliance
  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult
Tag

Relay Attacks Archives | BlueOrange Compliance

CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks – Reminder!

What if we were to tell you that anyone connected to your network could simply…
Joan Elewski
Joan ElewskiJuly 20, 2021
CybersecurityHIPAAHIPAA SecurityRansomware

Ransomware Advisory

On October 28th, 2020 multiple government agencies released a joint alert regarding “credible information of…
Joan Elewski
Joan ElewskiOctober 29, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

Mitigating the Risks of Relay Authentication Attacks

So, now that we have explained how the attacker can get access, it’s time to…
Joan Elewski
Joan ElewskiSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security

The Risks of Relay Authentication Attacks

What if we were to tell you that anyone connected to your network could simply…
Joan Elewski
Joan ElewskiSeptember 15, 2020

Recent Posts

  • Secure Our Future: Building Cyber Resilience for the Next Era of Care October 27, 2025
  • Secure Our Data: Protecting Healthcare Information in an Expanding Digital Ecosystem October 20, 2025
  • Expanding Your Protection: BlueOrange + CloudWave Strengthen Healthcare Cybersecurity October 15, 2025
  • How BlueOrange Compliance Uses Penetration Testing and Phishing Simulation to Strengthen Healthcare Cybersecurity October 15, 2025
  • Is Your HIPAA Security Risk Assessment Good Enough? October 15, 2025

Categories

Access Control Breaches Business Associates CISA Covered Entity COVID-19 Cybersecurity devices Encryption EPHI Hackers Healthcare Workers HIPAA HIPAA Compliance HIPAA Privacy Compliance HIPAA Security HIPAA Violations Incident Response Long Term Care Meaningful Use Media Marking Multi-Factor Authentication NIST OCR OCR Investigations Office for Civil Rights Penetration Testing PHI Phishing Policies and Procedures Privacy Ransomware Right to Access Secure Disposal Security Security Awareness Training Smart Assistants Telehealth Teleworking Training Visitors vulnerability Vulnerability Scan Webinar Work from home

Problems We Solve

  • HIPAA Risk Assessment
  • Cybersecurity Solutions
  • Penetration Testing
  • HITRUST Certification
  • OCR Audit Prep

Problems We Solve

  • Is your environment secure?
  • Is your organization an easy target for a cyber-attack?
  • Do you know how to manage an OCR Investigation?
  • What if your organization has a security breach?
  • Are you ready for an OCR Investigation
  • Are you prepared for Promoting Interoperability Programs?

Solutions

  • The BlueOrange Difference
  • Our Approach
  • Testimonials
  • Commonly Asked Questions

Resources

  • Blog
  • Resources
  • Case Studies
  • Privacy Policy
  • Sitemap
  • Contact Us

P: 855-500-6272 E: info@blueorangecompliance.com Request a Consult

  • Cybersecurity
    • Cybersecurity Solutions
    • Phishing Awareness Testing & Training
    • Penetration Testing
    • IT Security
      • Security Breach Support
      • Cybersecurity Best Practices
      • Technical Testing
  • HIPAA Compliance
    • HIPAA Risk Assessment
    • OCR Audit Prep
    • Expedient HIPAA Compliance
  • HITRUST
  • Why Us
    • The BlueOrange Difference
    • Our Approach
    • Commonly Asked Questions
  • Resources
    • News
    • Webinars
    • Case Studies
    • Blog
  • Contact Us
    • Request A Consult