Posted and filed under Careers, Coding.

5 Things You Need to Know About Becoming a CPC

Strategy is Key Becoming a Certified Professional Coder is no easy feat, and the exam administered by the American Academy of Professional Coders (AAPC) is a long, grueling assessment. Of course, the exam will present CPCs-to-be questions on CPT codes, Evaluation and Management, the bodily systems, and the application of multiple code sets – but…

Read the full article

Posted and filed under Coding, YouBeTheCoder.

You Be The Coder: Evaluation and Management (E/M)

Assess your knowledge of Evaluation and Management while taking our free E/M Calculator for a test drive! Review the below patient notes and plug the appropriate information into our audit tool. History of Present Illness (HPI) Patient is complaining of chest pain which he has been experiencing on and off for two days now. He…

Read the full article

Posted and filed under Coding, Compliance, FWA, Healthcare.

Pre-Litigation Considerations

Law firms have been known to enlist the help of a third-party when dealing with healthcare fraud cases. This is because in addition to investigating the allegations against one party, there is a myriad of additional pre-litigation considerations. In multi-faceted cases in which health plan overpayments are being pursued within the judicial system an audit…

Read the full article

Posted and filed under Coding, FWA.

Investigating Health Plan Overpayments

Picture yourself balancing on top of a fence with vast expanses of land, each with their own set of governance, visible to you from both sides. You’re straddling the fence, your legs occupying each of the divided spaces. Where do you stand? It depends on which way the wind blows. Such is the case with…

Read the full article

Posted and filed under Compliance, Cybersecurity, Healthcare.

HITRUST FAQ

Q: Just what is HITRUST anyway? A: HITRUST is a common security framework (CSF) created and governed by the HITRUST Alliance, a privately held U.S. company made up of leaders from healthcare, technology, and information security. The framework is comprised of several prescriptive security controls that can be assessed to determine the level of information…

Read the full article

Posted and filed under Dental, Fraud, FWA.

Fraud Round-Up

If you read the news, you know that health care fraud is just as prevalent as ever. During any given time, you will be able to find a headline about a provider or care giver defrauding patients, insurance companies, or CMS in every state across the nation. This month we’ve seen quite a few colorful…

Read the full article

Posted and filed under Coding, Cybersecurity, Events, Fraud, FWA.

From ECC to IASIU

Advize Health kicked off the month of April by diving headfirst into Conference Season, and attending the Eastern Claims Conference in Boston, MA. The Eastern Claims Conference, recently relocated from New York to Massachusetts was an impressive assembly of insurance professionals. Catering to life, disability, medical, legal, and insurance claims; the Eastern Claims Conference has…

Read the full article

Posted and filed under Coding, Compliance, Cybersecurity, Fraud.

Safeguard Your EHR

If healthcare was a chemical solution, and relevant technologies were solutes – the mixture would quickly become a fragmented clump of, well…various technologies. The healthcare market is over-saturated with technology designed to “fix” the present problems plaguing the ecosystem. Of course, in a paradoxical twist of fate, these solutions come with a new set of…

Read the full article

Posted and filed under Compliance, Healthcare.

Pennsylvania Examines Breadth of Peer Review Protection Act

On December 13, 2012, a newborn was delivered via C-section by a physician at the Scranton Quincy Hospital Company LLC. Despite the surgical means of delivery, the child suffered an acute hypoxic ischemic brain injury (P91.60) that ultimately resulted in permanent disability. The parents of the child decided to take legal action against the obstetrician…

Read the full article

Posted and filed under Cybersecurity, Technology.

The Power of Mindfulness at Work

Chances are, you’re no stranger to the term “mindfulness”. In the past few years, mindfulness has snowballed from a seed of change into a full-fledged and fortified pillar of wellness. Mindfulness is defined as, “a mental state achieved by focusing on one’s awareness on the present moment, while calmly acknowledging and accepting one’s feelings, thoughts,…

Read the full article