In healthcare, selecting a vendor to work with is a serious process that should not be taken lightly. It is important to research vendors and choose the right one, as you will be working with this vendor for many years to come. A major factor in your decision process should be the security and compliance certifications that your eligible vendors have earned. It is important to make sure that the payment vendors you decide to work with have the right
March Madness begins this month and I’ve been busy studying bracketology as closely as I examine healthcare payment security. In doing so, I can’t help but notice that the science and logic behind selecting the right NCAA basketball teams for your March Madness bracket is similar to the attention that needs to be given to security and compliance decisions in healthcare.
Now, I’m no Joe Lunardi and these picks won’t be featured on ESPN, but it’s important for healthcare organizations to
Guest Blogger: Chris Seib, Co-Founder & CTO, InstaMed
Last week, I highlighted some common oversights by businesses when leveraging a private cloud that increase the risk of long-term data outages, and detailed the best practices and tips to use in discussions with current or potential vendor partners in order to protect your business. Below is Part 2 of this post, focusing on disaster recovery, business continuity and security.
Even with high degrees of local redundancy in a private cloud data center,
Healthcare reform is a major factor driving change in payer-to-provider payments, including the medical loss ratio (MLR) requirement in PPACA. To reduce administrative costs and meet the MLR mandate, payers are implementing more efficient payment delivery methods. One such method is the offering of ERA/EFT, which combines both the payment and the healthcare payment information to enable provider funding, posting and reconciliation. While many payers have been sending providers ERAs (electronic remittance advice) for years, it’s time for payers to