CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing Vulnerability Scans and Penetration Tests: What’s the Difference? We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingApril 27, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy HIPAA’s Right of Access Initiative Isn’t Slowing Down We have been following the OCR’s and HHS’ Right of Access Initiative over the past…Jordan KeatingApril 20, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy 21st Century Cures Act Final Rule Goes Into Effect In effect as of this week, April 5th, The Cures Act Final Rule implements some…Jordan KeatingApril 7, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Security Awareness Training: What Should You be Covering? All information system users in an organization need Security Awareness Training. Security Awareness Training should include training for…Jordan KeatingMarch 31, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Adopt a Clean-Desk Policy In a busy environment it can be very easy for staff to let clutter build…Jordan KeatingMarch 26, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware End User Phishing Reminder! Take time to remind your end users on what to look for in phishing attempts!…Jordan KeatingMarch 23, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA Violations BlueOrange Webinar: Conditional Access – When Multifactor Authentication is Not Enough BlueOrange’s educational webinar, “Security in Layers Series: Conditional Access - When Multifactor Authentication is Not…Jordan KeatingMarch 19, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Mobile Device Best Practices Many organizations allow employees to use mobile devices for everything from email to logging patient…Jordan KeatingMarch 16, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsHITRUSTPrivacy A Zero Trust Security Model In light of recent and more sophisticated and complex cyber threats, the National Security Agency…Jordan KeatingMarch 12, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy HIPAA Right of Access Initiative Continues! “HIPAA Right of Access Initiative Continues!” We have been following the OCR’s and HHS’ Right…Jordan KeatingMarch 9, 2021