Medicare Compliance & Reimbursement

PHI:

Plan How You'll Handle Ransomware Attacks

Beware: You might have to pay to access your own patient files. Your PHI is being held hostage. What should you do? While this scenario sounds like something straight out of a new computer game, it’s all too real for one medical center. Now’s the time to plan how you would respond to a similar attack. Background: On Feb. 17, [...]
You’ve reached your limit of free articles. Already a subscriber? Log in.
Not a subscriber? Subscribe today to continue reading this article. Plus, you’ll get:
  • Simple explanations of current healthcare regulations and payer programs
  • Real-world reporting scenarios solved by our expert coders
  • Industry news, such as MAC and RAC activities, the OIG Work Plan, and CERT reports
  • Instant access to every article ever published in Revenue Cycle Insider
  • 6 annual AAPC-approved CEUs
  • The latest updates for CPT®, ICD-10-CM, HCPCS Level II, NCCI edits, modifiers, compliance, technology, practice management, and more

Other Articles in this issue of

Medicare Compliance & Reimbursement

View All

Which Codify by AAPC tool is right for you?

Call 844-334-2816 to speak with a Codify by AAPC specialist now.