Medicare Compliance & Reimbursement

Cybersecurity Quiz:

Test Yourself on These 10 Phishing-Related Essentials

Tip: Know the difference between a trojan horse and honeypot. Whether your employees are digitally savvy or technically inept, they should still be able to identify basic tactics used by social engineers and hackers. Why? It’s critical that your staff are able to recognize cyber attackers’ modus operandi; moreover, a clear understanding of the basics of social engineering allows you [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more