Healthcare Revenue Cycle Management, ICD-10, Claims Reimbursement, Medicare, Medicaid

Patient Privacy Resources

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Expert Advice: How to Stay Off the HIPAA “Wall of Shame”

HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How ca... View webcast

Stop the Referral Problem: Building Digital Care Transitions that Reach Your Entire Network

Is your hospital hamstrung by patient care transitions that rely on fax, contribute to referral leakage, and drive up administrative costs, because you are unable to share electronic medical records or digitally communicate with physicians ... Download white paper

How to Secure Sensitive Data while Supporting Improvements to Patient Care Delivery

The healthcare industry’s rapid digital transformation has fueled impressive innovation, but has also created numerous challenges related to data management, security, and analytics. Providers, payers, and other healthcare organizatio... Download white paper

HIPAA Data Security Best Practices

Even as healthcare record breaches are growing at an alarming rate, organizations don’t have to stay vulnerable to security risks. Putting technical safeguards in place can protect your organization against data breaches and ransomwar... Download white paper

Implementing Best Practices for Securing Patient Data

Cybercriminals are putting more time and resources into exploiting and monetizing patient data, with medical record information proving more valuable than Social Security numbers and other personally identifiable information (PII). As a res... View webcast

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

Geisinger Fights Opioid Abuse and Saves $10M Annually with EPCS

Geisinger Health System, a 767-bed health system serving three million patients in PA and NJ, is rooted in innovation and constantly searching for new and better ways to care for patients. One way Geisinger has led the pack is with their ho... View webcast

How Northwell is Eliminating Duplicate Records Once and For All

Northwell Health is on a mission to eliminate duplicate patient records. Read this case study to learn the evolution of Northwell’s approach to patient matching, from the very first steps diagnosing its problem to how Northwell is usi... Download white paper

The GoAnywhere Book of Secure File Transfer Project Examples

Every organization has a process for sharing files. Some use scripts, others use a tool like Drobox. But is your method secure? And is it efficient? Download the eBook and be inspired with 20 real-life examples of how organizations of all s... Download white paper

How Managed File Transfer Addresses HIPAA Requirements for ePHI

As the healthcare industry transitions from primarily using paper documents and patient charts to electronic health records, many clinics, hospitals, and organizations are looking for a more secure, reliable method of sharing electronic pro... Download white paper

Five Ways to Improve ePHI for HIPAA/HITECH with Managed File Transfer

The healthcare industry is under building pressure to make health information more accessible to both patients and healthcare providers, while also ensuring that patient data remains private and secure. Managed File Transfer (MFT) solutions... Download white paper

Beyond FTP: Securing and Managing File Transfers

FTP first made its appearance in 1971, and it hasn’t changed much since. Poor FTP implementation has left many businesses with severe security and management issues. Download the eBook to learn why typical FTP implementation puts your... Download white paper

Preventing Vulnerabilities in Healthcare From Affecting Patient Care

Healthcare organizations have become an attractive target for cyberattackers as patient data has grown in value on the black market. Despite this growing attraction among cybercriminals, the health systems, hospitals, and physician practice... View webcast

Improving Cerner® Patient Matching with a Simple Plug-in

Learn how to instantly and dramatically improve Cerner’s patient matching without disrupting Cerner or deploying a third-party EMPI product. By plugging into the power of Referential Matching, you will get the full value from your Cer... Download white paper

Case Study: How Healthix Achieved Real-Time High-Accuracy Patient Matching

Healthix, the largest public HIE in the country, covers over 16 million patients. At this scale, accurate and real-time patient matching is a challenge. Learn how Healthix automated its data stewardship and improved its patient matching wit... Download white paper

Improving Patient Matching in your EHR: A Case Study

There are ways to improve any EHR system’s patient matching performance without disrupting any core MPI functionality. View this webinar to hear how Northeast Georgia’s HealtheConnection tackled their patient matching probl... View webcast

A blueprint for EPCS success: Achieving full DEA compliance while ensuring workflow efficiency

Like many healthcare organizations, Hartford HealthCare was dealing with the inefficiencies that came with prescribing controlled substances on paper. In June 2017, as Hartford HealthCare considered possible options for improving its prescr... View webcast

Gain Insight into Member Data with Referential Matching

As strategic initiatives require more clinical, socio-economic and behavioral health data, “head-to-head” member data comparison fails, and matching becomes exponentially more difficult. Learn about a cloud-based service that ca... View webcast

Improve Patient Matching in Epic® Identity™ with a Simple Plug-in

Learn about a cloud-based service that can resolve patient matches that elude Epic’s EMPI, Epic® Identity™, and improve satisfaction and safety across the organization. Read more to learn how: Patient matching issues cause d... Download white paper

X

Join 30,000 of your peers and get free access to all webcasts and exclusive content

Sign up for our free newsletter:

Our privacy policy

no, thanks

Continue to site...