Blog Posts by Tag: Security
An Overview of Cybersecurity at XiFin
Marty BarrackChief Legal and Compliance Officer, XiFin, Inc. Michael ConlonAVP Cyber Security, XiFin, Inc. XiFin’s commitment to cybersecurity starts with its focus on appropriate frameworks to guide its cybersecurity efforts. We utilize the National Institute of Standards...
Must-Have Compliance Capabilities to Manage Risk and Help Drive Growth
Thorough RCM processes address a myriad of compliance issues that can cost an organization money, business freedom, and even exit opportunities. Compliance requirements are continually changing, and any misstep could result in lost revenue, fines, and even extreme penalties such as debarment, corporate integrity agreements, and criminal consequences for the company and responsible individuals. ...
Understand the Black Book Research Criteria to Choose the Right Outsourced RCM Services Provider
This blog is part of a series. Read Part 1 and Part 3. As our second blog in this series about the benefits of using Black Book Research’s comprehensive set of assessment criteria to evaluate outsourced revenue cycle management (RCM) service providers, we focus on the measures associated with Security, Compliance, and Trust.Black Book Research evaluated outsourced diagnostic/laboratory RCM...
Protecting Customer Data: Focus on Physical Security
Protected Health Information (PHI) is a desirable and lucrative target of hackers and cybercriminals around the world. When sold on the black market, PHI is projected to be up to 40 times more valuable than a credit card record, particularly if it contains social security numbers. According to the 2020 Trustwave Global Security Report, a healthcare data record may be valued at up to $250 per...