As of 2015, both prepayment and post-payment audits can occur. Each audited practice must produce three required categories of documents.
[Read More]As of 2015, both prepayment and post-payment audits can occur. Each audited practice must produce three required categories of documents.
[Read More]Handling a medical practice for a Meaningful Use audit is much easier with some preparation and planning. Here are tips for your next MU audit.
[Read More]All security experts concur on this one fact: in the face of unethical hackers crawling the Internet for targets, only encryption can win.
[Read More]Worried about hackers from faraway countries breaking into your medical practice’s computer systems? The risk may be a lot closer to home. In fact, the risk may even be in your office.
[Read More]Identification and authentication comes in the form of passwords, user IDs, biometric keys, and so on. These form the ultimate line of defense between authorized and unauthorized access to patient EHR data. So how can these credentialing protocols help boost your practice security?
[Read More]