How to Spot, Avoid and Report Malware

How to Spot, Avoid and Report Malware

Whether you’re a one-person billing company or a multi-location organization, it’s possible that you’ve seen or heard of Malware and the potential risks associated with it and how it can cause major downtime and potential HIPAA violations due to breached information.

Criminals use malware to steal personal information, send spam, and commit fraud. Malware includes viruses, spyware, and other unwanted software that gets installed on your computer or mobile device without your consent. These programs can cause your device to crash and can be used to monitor and control your online activity. They also can make your computer vulnerable to viruses and deliver unwanted or inappropriate ads.

Here are a few, high-level quick steps you can take to spot and avoid Malware.

First, let’s talk security software.

Install and update security software, and use a firewall. Set your security software, internet browser, and operating system (like Windows or Mac OS X) to update automatically, and don’t forget to Back up your data regularly. Strong security software can prevent a hack or scam before it happens. You should install well-known software directly from the source. Sites that offer lots of different browsers, PDF readers, and other popular software for free are more likely to include malware. Read each screen when installing new software. If you don’t recognize a program or are prompted to install additional “bundled” software, decline the additional program or exit the installation process.

Don’t change your browser’s security settings and pay attention to your browser’s security warnings. Many browsers come with built-in security scanners that warn you before you visit an infected webpage or download a malicious file.

Next, watch what you’re clicking on.

Instead of clicking on a link in an email, type the URL of a trusted site directly into your browser. Scammers send emails that appear to be from companies you know and trust. The links may look legitimate, but clicking on them could download malware or send you to a scam site. Don’t open attachments in emails unless you know who sent it and what it is. Opening the wrong attachment — even if it seems to be from friends or family — can install malware on your computer.

Avoid clicking on pop-ups or banner ads about your computer’s performance! Scammers insert unwanted software into banner ads that look legitimate, especially ads about your computer’s health. Avoid clicking on these ads if you don’t know the source.

Your computer may be infected with malware if it:

    • slows down, crashes or displays repeated error messages
    • won’t shut down or restart
    • serves a multitude of pop-ups
    • serves inappropriate ads or ads that interfere with page content
    • won’t let you remove unwanted software
    • injects ads in places you typically wouldn’t see them, such as government websites
    • displays web pages you didn’t intend to visit, or sends emails you didn’t write

Other warning signs of malware include:

    • new and unexpected toolbars or icons in your browser or on your desktop
    • unexpected changes in your browser, like using a new default search engine or displaying new tabs you didn’t open
    • a sudden or repeated change in your computer’s internet home page
    • a laptop battery that drains quicker than it should

At Live Compliance, we make checking off your compliance requirements extremely simple.

  • Reliable and Effective Compliance
  • Completely online, our role-based courses make training easy for remote or in-office employees.
  • Contact-free, accurate Security Risk Assessments are conducted remotely. All devices are thoroughly analyzed regardless of location. Conducting an accurate and thorough Security Risk Assessment is not only required but is a useful tool to expose potential vulnerabilities, including those such as Password Protection.
  • Policies and Procedures curated to fit your organization ensuring employees are updated on all Workstation Use and Security Safeguards in the office, or out. Update in real-time.
  • Electronic, prepared document sending and signing to employees and business associates.

Don’t risk your company’s future, especially when we are offering a free Organization Assessment to help determine your company’s status. Call us at (980) 999-1585, or email me, Jim Johnson at Jim@LiveCompliance.com or visit www.LiveCompliance.com

For more information about DarkWeb breaches please contact us at (980) 999-1585 or email us at support@livecompliance.com

 

Dark Web Breaches: Steps you can take, to avoid being a victim

Dark Web Breaches: Steps you can take, to avoid being a victim

It’s no secret that the Dark Web is a scary place to lose your information, but what if it affected your entire company? Medical Records information sells anywhere from $1-$1000 by identity thieves!

What is a “breach” and where has the data come from?

A “breach” is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. Data breaches are becoming more common and sometimes out of your control.

How can you protect yourself and/or your organization?

  1. Carefully monitoring where you store and enter your passwords can be extremely beneficial to help minimize the risk of a hack and keeping personal or patient information protected.
  2. Routine password changes and monitoring where you store and enter your passwords, can be extremely beneficial to help reduce the risk of becoming a victim to a hacker. Passwords should be long, unique in characters, capitalization, and alphanumerical.

If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.

Firefox Monitor says, “Your password is your first line of defense against hackers and unauthorized access to your accounts. The strength of your passwords directly impacts your online security.”

Live Compliance can help. Live Compliance aggregates breaches and enables you to assess where their personal data has been exposed. Dark Web scanning is built right into the Live Compliance portal. Keep an eye on employees whose information was involved in a breach (and where the breach took place), and the suggested next steps to take.

What can I do to ensure this doesn’t happen to me or my organization?

At Live Compliance, we make checking off your compliance requirements extremely simple.

  • Reliable and Effective Compliance
  • Completely online, our role-based courses make training easy for remote or in-office employees.
  • Contact-free, accurate Security Risk Assessments are conducted remotely. All devices are thoroughly analyzed regardless of location. Conducting an accurate and thorough Security Risk Assessment is not only required, but is a useful tool to expose potential vulnerabilities, including those such as Password Protection.
  • Policies and Procedures curated to fit your organization ensuring employees are updated on all Workstation Use and Security Safeguards in the office, or out. Update in real time.
  • Electronic, prepared document sending and signing to employees and business associates.

Don’t risk your company’s future, especially when we are offering a free Organization Assessment to help determine your company’s status. Call us at (980) 999-1585, or email me, Jim Johnson at Jim@LiveCompliance.com or visit www.LiveCompliance.com

For more information about DarkWeb breaches please contact us at (980) 999-1585 or email us at support@livecompliance.com

[Contribution by Jim Johnson at Live Compliance]

Doing a HIPAA Security Risk Assessment

Doing a HIPAA Security Risk Assessment

Your organization’s annual HIPAA Security Risk Assessment and Analysis are only one element of the compliance process, and whether you’re a Business Associate or Covered Entity, your organization must also “implement security updates as necessary and correct identified security deficiencies”. In other words, you must act via a Corrective Action Plan (CAP) following the required risk assessment process.

Here are a few common Corrective Action Plan steps:

  • Implement technical policies and procedures to allow access only to those persons or software programs that have been granted access rights to information systems maintained.
  • Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
  • Conduct accurate and thorough assessments of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
  • Develop a complete inventory of all its categories of electronic equipmentdata systems, and applications that contain or store ePHI, which will then be incorporated into its Risk Analysis, and must complete a Risk Management plan.

 

What happens if I fail to complete my Security Risk Assessment?

Failing to complete your annual Risk Assessment oftentimes means the organization will be required to complete a “robust” Corrective Action Plan (CAP) and often with at least two years of monitoring activity.

Have you ever doubted whether a small billing company or independent physician practice actually ever face penalties?

Well, keep in mind, a Business Associate is a ‘person’ or ‘entity’. This means that there is no billing company too small to have to comply with the Federal HIPAA regulations. Again, if you have not completed an accurate and thorough security risk assessment prior to that, you could also be penalized under ‘willful neglect’. This category alone is $50,000 per violation!

It is important for you to understand that every complaint or potential breach must be investigated by HHS/OCR. If you, a billing company, or another vendor suspects a breach, you must inform the covered entity (your client) and have a breach risk assessment completed to determine key factors and take action.

 

An EZClaim partner, Live Compliance, will help you to make checking off your compliance requirements extremely simple. They provide:

  • Completely online, our role-based courses make training easy for remote or in-office employees.
  • Contact-free, accurate Security Risk Assessments are conducted remotely. All devices are thoroughly analyzed regardless of location. Conducting an accurate and thorough Security Risk Assessment is not only required but is a useful tool to expose potential vulnerabilities.
  • Complete set of HIPAA Policies and procedures built directly into your portal. Includes actionability, change management documentation, and Incident Response Policy to assist with your Corrective Action Planning. Easily share policies with staff with one click.
  • Built directly into your portal, easily monitor where your workforce may be vulnerable with our Dark Web Breach Searches. Easily expose breach sources with ongoing searching of active employee email or domain ensuring continued awareness of potential breach exposure. Weekly automatic email notifications if new breaches are discovered.
  • Short, informative, privacy awareness videos covering technical, administrative, and physical safeguards with topics such as ransomware, phishing, the Dark Web, password protection, and more. All delivered monthly with no logins required, they empower your workforce to make conscious decisions when it comes to your organization’s privacy and security.

 

So, don’t risk your company’s future, especially when Live Compliance is offering a FREE Organization Assessment to help determine your company’s status. For more information, visit their website, e-mail them, or give them a call at 980.999.1585.


ABOUT EZCLAIM:
EZClaim is a medical billing and scheduling software company that provides a best-in-class product, with correspondingly exceptional service and support. Combined, they help improve medical billing revenues. To learn more, visit EZClaim’s website, e-mail them, or call them today at 877.650.0904.

[ Contribution by Jim Johnson with Live Compliance ]

How to Improve Medical Billing Revenues

How to Improve Medical Billing Revenues

It IS POSSIBLE to improve medical billing revenues, and here are a few ways to do just that.

Healthcare practitioners, whether established or just starting out, have many overwhelming tasks: Managing a practice; Seeing patients; Working to staying up-to-date on administrative tasks; The whole host of compliance at the federal, state, and local level; and Overseeing the billing.

One of these that can lead to loss of revenue is not properly managing the medical billing, which can also lead to HIPAA fines and rejected claims. However, there is a solution: a medical billing system that balances the budget and optimizes revenues of medical practice.

EZClaim, an expert in the medical billing software market since 1997, provides a solution that improves the efficiency of an office’s billing process in many ways. The following are the primary reasons.

Reduce Coding Errors
Medical procedures become codes, codes become claims, and claims become revenue. Any error in this process can make claims to be denied, your workload can be increased, and revenue can be lost. To help in avoiding errors, it is essential to use billing software that offers the easiest implementation and access to descriptive diagnosis and treatment codes. EZClaim’s medical billing solution offers ease-of-use in coding, billing, and strong partnerships with Clearinghouses which act as an additional ‘safety net’ for catching errors.

Administrative Support
Most medical practices are a small team of people tackling a wide range of tasks, so when one cannot understand the function of the billing software, accessing reliable support is very important. EZClaim prides itself on having dedicated support experts available, and that was how the company was established. Founder and President Al Nagy has said, since day one, “We are a support company that happens to sell medical billing software.”

Maintain Industry Compliance
It is important to recognize that industry compliance and a practice’s revenue go hand-in-hand. Filing and batching inaccurate and non-HIPAA compliant claims can often be traced back to an outdated healthcare revenue management system. Conquering these tasks requires a focus on multiple fronts: A properly trained billing team, clear office procedures, patient payment policies, and a reliable medical billing company. These are all ways to help buttress against non-compliance and rejected claims.

Streamline Workflow
Recently, a study was done that showed almost 80% of medical bills contain errors. These incorrect medical claims often end up as lost revenue originally, not to mention the additional cost of resubmissions and collections. One of the best ways to resolve this problem for your practice is to make use of both well-trained, experienced billers and coders, combined with a competent medical billing solution that aids in catching these errors. EZClaim software features a library of standard validation, the ability to add custom validation, and integrates with Alpha II for full claim scrubbing.

Follow up
Errors will and do occur, so establishing a system for follow-up on all denials will close the loop and protect against lost revenue. Being consistent with the follow-up process, and having a medical billing solution that tracks these things will help close that gap.

Collections
Finally, probably the most important aspect that optimizes a practice’s revenue is to get paid. Portals and payment collection systems definitely help with this, but having collections integrated into the medical billing system is, of course, the best. EZClaim has pain-free payment processing integrated into their solution, called EZClaimPay. It solves all the problems associated with payment processing: Bank deposits, reconciliation, statements, changing fees, and ‘finger-pointing’ when there is a problem. EZClaimPay’s robust platform will greatly increase a practice’s collections success, and improve their revenue.

———————————-

ABOUT EZCLAIM:
EZClaim is a medical billing and scheduling software company that provides a best-in-class product, with correspondingly exceptional service and support, and can help improve medical billing revenues. To learn more, visit their website, e-mail them at sales@ezclaim.com, or call a representative today at 877.650.0904.

[ Photo credit: Studioarz ]

New Compliance Regulations for Working at Home

New Compliance Regulations for Working at Home

Whether you and your workforce are back in the office, or still working from home, there are new compliance regulations, and your HIPAA Compliance program may be a bit different.

Reliable and Effective Compliance

Completely online, our role-based courses make training easy for remote or in-office employees.

Contact-free and accurate Security Risk Assessments are conducted remotely. All devices are thoroughly analyzed regardless of location.

Policies and Procedures curated to fit your organization ensuring employees are updated on all Workstation Use and Security Safeguards in or out of the office and updated in real-time.

Electronic, prepared document sending and signing to employees and business associates.

Don’t risk your company’s future, especially when we are offering a FREE Organization Assessment to help determine your company’s status regarding the new compliance regulations. [ Click here to download a “HIPAA Compliance Requirements” document ].

Live Compliance is a partner of EZClaim, and you can contact them directly by either calling them at (980) 999-1585, e-mail Jim Johnson at Jim@LiveCompliance.com, or visit them at LiveCompliance.com

[ Written by Jim Johnson, President of Live Compliance ]