Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are who and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone [Read More...]

Sharing Cyber Threat Info to Improve Security

Cyber-security Sharing Bill

Last month the Senate Intelligence Committee approved a bill that would protect firms from any legal liability for sharing cyber threats with the government. This bill would set up a web portal in the Department of Homeland Security where private firms can confidentially share threat information without legal liability. The counterbalance to this sharing of information [Read More...]

Detecting Fraud and Abuse in Healthcare

docs-smiling

Join us at the AHIMA CDI Summit on Tuesday, August 5 at the Grand Hyatt in Washington, DC for a panel discussion on “Leveraging Data and Analytics to Detect Fraud and Abuse in Healthcare” with Dr. Michael Nelson as one of the panelists. The AHIMA CDI Summit is the premier industry event dedicated to leading the documentation [Read More...]

MESC: Streamlining the Applicant Eligibility Experience with Program Integrity

Health Care Reform ACA

Will you be at MESC this year?  Join us on Thursday, August 21 at 11:00 AM in Room 702 for a presentation on how to improve program integrity by understanding applicant eligibility early in the process. Public health and welfare outcomes are enhanced when members smoothly access the correct programs. States, exchanges, and human services programs need [Read More...]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Combating Identity Misuse and Fraud in a Global, Social Economy

shutterstock_120012388

Illicit use of identities has been occurring for many years; however, due to the faceless nature of e-commerce and now consumer banking, the impacts are being felt in a painful way across all industries. It is not uncommon for fraud losses to be measured in the tens of millions of dollars, and these losses have [Read More...]

Assessing Risk for the Best Fraud Prevention

Revolving Door

Leading analysts have called for a layered security model to protect against online fraud, account take-over, and financial loss.  Trends are also showing that businesses need to improve the interactive end user experience by minimizing intrusive authentication methods while still maintaining security for online transactions and reducing the opportunities for fraud. There is a way [Read More...]

States react to data breaches and potential identity fraud

shutterstock_119788786

The state of Montana recently announced that a server at the Montana Department of Public Health and Human Services was hacked in May, exposing 1.3 million records potentially including names, addresses, birth dates and Social Security numbers. In 2012, a data breach at the South Carolina Department of Revenue exposed tax records and financial information [Read More...]

Improving Patient Outcomes through Secure Data Exchanges

shutterstock_32336797

Michael Nelson recently presented at the WEDI Annual Conference on the topic of Secure Medical Record Exchanges. Sharing patient information across healthcare networks helps providers offer better care, improve patient outcomes, and reduce costs. However, as more and more health information becomes available electronically through secure data exchanges – Electronic Health Records (EHRs) and Health [Read More...]