Preparing for Medicaid Audits

Lorman

State Medicaid programs rely on a number of 'program integrity' mechanisms to detect and investigate fraud, ranging from criminal investigations to a number of different audit procedures. However, like their Federal Medicare counterparts, Medicaid audits may be aggressive and result in demands for large sums of money. This topic will cover several common types of Medicaid audit processes, describe how they affect providers, and what they can do to get ready.
Watch Now

Spotlight

How does technology improve a radiologist’s life and what is the impact on patient care? In this video, Brian Edds, VP of Product Strategy at Spok answers these key questions, addressing the important role technology can play in improving communication among doctors, radiologists and patients, saving time, and ultimately leading to improved patient care...

OTHER ON-DEMAND WEBINARS

How Artificial Intelligence is Revolutionizing CDI Program

AHIMA

There are large amounts of clinical health data available through electronic health records. The increase in data coupled with the emergence of new, sophisticated machine learning algorithms are revolutionizing healthcare industry trends and changing the way CDI interacts with physicians, collaborates with coders, and how CDI operate within a clinical setting. CDI professionals will decipher how to elevate their respective CDI program with cloud, data, and collaboration using CDI software.
Watch Now

SSH Keys: Security Asset or Liability for Healthcare?

HIMSS Media

With the extensive network systems found in the healthcare industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and control can create HIPAA violations by not adequately restricting access to Electronic Protected Health Information (ePHI). If SSH keys are not surely managed, the organization does not know who has access. In this session, we’ll examine SSH study results that reveal widespread lack of security controls for SSH keys in the healthcare industry. We’ll discuss the common mistakes that almost all healthcare organizations make around security, policy, and auditing practices when managing SSH keys.
Watch Now

Implementing a Successful Multifactor Authentication Strategy for Healthcare

Imprivata

As healthcare contends with emerging security threats and new workflow regulations, multifactor authentication (MFA) is as important as ever. But there are unique challenges that must be considered when selecting a solution — the workflow must be efficient and transparent for users to avoid disruption to productivity. And, there are specific clinical workflows that require MFA that must be considered as part of a broader strategy. In October, a new federal law was passed that mandates electronic prescribing for controlled substances (EPCS) though Medicare Part D.
Watch Now

New Insights on Digital Health Readiness

HIMSS Media

Evolving consumer expectations and the drive toward value-based care are causing healthcare providers to recast the healthcare experience they provide. While digital transformation is a key component of this evolution, efforts still appear to be largely fragmented, and convenient frameworks to assess and monitor digital health readiness still are not widely available. This makes managing competing priorities while promoting the best digital adoption and deployment delivery practices quite difficult.
Watch Now

Spotlight

How does technology improve a radiologist’s life and what is the impact on patient care? In this video, Brian Edds, VP of Product Strategy at Spok answers these key questions, addressing the important role technology can play in improving communication among doctors, radiologists and patients, saving time, and ultimately leading to improved patient care...

resources