Member
This advisory documents key findings from the inpatient rehabilitation facility prospective payment system for fiscal year 2021.
The FBI’s Baltimore Field Office, in coordination with Office of Private Sector (OPS), prepared this LIR to inform private sector partners about recent Personal Protective Equipment (PPE) fraud schemes targeting the Healthcare Sector.
Cyber threat modeling is the process of developing and applying a representation of adversarial threats (sources, scenarios, and specific events) in cyberspace.
Attached are three spreadsheets, one comparing relative weights and payment rates at the APC level, using the 2021 proposed rule Addendum A compared to Addendum A effective July 1, 2020, as downloaded from the CMS website. The second spreadsheet makes similar comparisons at the HCPCS level, using…
Thank you for your continued heroic work to care for your communities as our nation battles the COVID-19 pandemic. As you likely know, the Department of Health and Human Services (HHS) has requested that all hospitals report certain data on bed capacity, utilization, personal protective equipment (…
The FBI is providing warning that a group of Iran-based malicious cyber actors was attempting to exploit CVE-2020-5902 as of early July 2020. This group has conducted a significant number of intrusions against US-based networks since August 2019, leveraging several CVEs pertaining to Virtual…
Today the FBI warned in a limited distribution report of a sophisticated and aggressive nation state campaign targeting known VPN vulnerabilities. The vulnerabilities have been previously published in a number of critical, common vulnerabilities and exposures (CVE) reports dating back to 2019.
Please join AHA Board Chair Melinda Estes, M.D., for the second in a series of Leadership Rounds – short conversations on a range of key issues Dr. Estes will have with hospital and health system leaders from across the country.
On 20 July, 2020, the first of what would become almost 4,000 unsecured and public-facing databases were completely destroyed. No explanation or ransom note was provided in what has been dubbed the ‘meow’ attacks. A number of recommendations on mitigating Meow attacks are available in the full…