News & Analysis

September 7, 2016
Medicare Insider

This week we have an excerpt from Observation Services Training Handbook, written by Janet L. Blondo, LCSW-C, MSW, CMAC, ACM, CCM, C-ASWCM, ACSW. For more information and to purchase, visit the HCPro Marketplace.

September 7, 2016
News & Insights

Q:  We are struggling with how to report the functional status codes that are required when a physical therapist provides therapy services post-operatively. We have a process for doing that for our “regular” therapy patients, but are struggling with how to implement this for the outpatient surgeries.

September 6, 2016
News & Insights

Is there any reason why an inpatient-only procedure would be performed on an outpatient?

September 2, 2016
News & Insights

CMS wants your thoughts on its 2017 OPPS proposed changes. In various places in the proposed rule, CMS specifically asks providers to comment on the proposals. You may submit comments to the agency until September 6.

 

September 1, 2016
Briefings on HIPAA

Cyber threats continue to grow and evolve, but most share a similar origin: phishing. Phishing emails, seemingly innocuous or legitimate emails used to infiltrate an organization, are a common source of malware and are used for scams in which a criminal impersonates another individual to obtain sensitive information. A study released in March by PhishMe estimated that up to 93% of phishing emails contain ransomware.

Although the damage phishing emails can do is tremendous, security officers can help their organizations turn the tide by using a combination of technical controls and targeted education.

The danger and the success of phishing emails lies in their ability to manipulate the individual on the receiving end. Phishing emails may be sent from domains that are a near-identical match for an organization's and come with what appear to be legitimate and urgent attachments or links. It's a simple scheme that criminals can use for a variety of purposes.

"They hope to get malware installed so they can control the computers they infect or even the entire network. They hope to get network or application login credentials. They hope to trick people into performing certain actions, i.e., a wire transfer of money," Kevin Beaver, CISSP, independent information security consultant at Principle Logic, LLC, in Atlanta, says. "The possibilities are endless."

September 1, 2016
HIM Briefings

Observation hours start accruing not when the patient comes into the hospital, but when the physician writes the order for observation. Observation hours end when all medically neces¬sary services related to observation are complete.

Pages