CybersecurityHIPAAHIPAA SecurityHIPAA Violations Adopt a Clean-Desk Policy In a busy environment it can be very easy for staff to let clutter build…Jordan KeatingMarch 26, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware End User Phishing Reminder! Take time to remind your end users on what to look for in phishing attempts!…Jordan KeatingMarch 23, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations BlueOrange Webinar: Conditional Access – When Multifactor Authentication is Not Enough BlueOrange’s educational webinar, “Security in Layers Series: Conditional Access - When Multifactor Authentication is Not…Jordan KeatingMarch 19, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Mobile Device Best Practices Many organizations allow employees to use mobile devices for everything from email to logging patient…Jordan KeatingMarch 16, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware BOC Alert: Microsoft Exchange Server Zero-Day Vulnerability Microsoft has released an alert that they have detected multiple zero-day exploits that are leaving…Jordan KeatingMarch 5, 2021
CybersecurityHIPAAHIPAA SecurityPhishingRansomware Penetration Testing with BlueOrange “Our priority is to find the practical, real-world entry points an attacker would use to…Jordan KeatingMarch 3, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware Password Complexity Reminder! As we round the bend of winter and head into spring, it’s a good time…Jordan KeatingFebruary 19, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware The Risks of Shared Passwords Passwords are what we use to protect access to systems or tools and in the…Jordan KeatingFebruary 9, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware BOC Alert: SonicWall Zero-Day Vulnerability What started as an unconfirmed SonicWall vulnerability has now been confirmed by the Cybersecurity &…Jordan KeatingFebruary 5, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware Top 5 Security Threats of 2020 and What You Can do About It One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…Jordan KeatingJanuary 15, 2021