More Articles

10 Myths of Security Risk Analysis Debunked

The HIPAA Security Rule requires organizations subject to HIPAA to conduct a Security Risk Analysis (SRA) to identify, address and mitigate risks to protected health information (PHI). The Office of… Read More

How Much Could One Data Breach Cost Your Organization?

In light of the recent Equifax data breach which has effected roughly 143 million Americans, protecting personal information has come to the forefront of thought for many people in the… Read More

Staffing Hourly Healthcare Employees: Is It Worth the Investment?

Staffing hourly employees in the healthcare environment is the industry norm – but there’s nothing “normal” about it. Some days are an adventure, and other days seem like a soap… Read More

AHIMA’s New Model Form Draws Attention to Right to Access

The American Health Information Management Association (AHIMA) recently released a model form, taking the lead in providing a resource when a patient requests a copy of their health information. AHIMA… Read More

Requirements of a Comprehensive Security Risk Analysis

HIPAA requires covered entities and business associates conduct a Security Risk Analysis (SRA) to ensure compliance with addressable and required elements of the HIPAA Privacy and Security rules. The intent… Read More

Insurance Verifications – New Way to Improve the Check-In Process & Bottom Line

Healthcare workers who are at the front desk and in the billing office are at the epicenter of an unprecedented “shake-up” in health insurance coverage and physician reimbursement. These employees… Read More