Your training checkup
Health Information Compliance Insider, January 1, 2011
This is an excerpt from a member only article. To read the article in its entirety, please login.
In a November 2010 benchmark study by the Ponemon Institute, 49% of 65 respondents identified lack of training as the second biggest area of vulnerability for a data breach. Only an inadequate budget for security and privacy (51%) ranked higher when respondents were asked to name the likely reasons for breaches.
This is an excerpt from a member only article. To read the article in its entirety, please login.
Related Products
Most Popular
- Articles
-
- Don't forget the three checks in medication administration
- Note similarities and differences between HCPCS, CPT® codes
- Differentiate between types of wound debridement
- OB services: Coding inside and outside of the package
- Q&A: Primary, principal, and secondary diagnoses
- Nursing responsibilities for managing pain
- Complications from immobility by body system
- The consequences of an incomplete medical record
- Practice the six rights of medication administration
- CDC alert: Screen for international travel as Ebola cases increase
- E-mailed
-
- CDC alert: Screen for international travel as Ebola cases increase
- Differentiate between types of wound debridement
- Q&A: Bill blood administration the same way for inpatient and outpatient accounts
- Q&A: A second look at encephalopathy as integral to seizures/CVA
- Performing a SWOT analysis
- Leadership training for charge nurses
- Helping Charge Nurses understand their leadership role (Part 2 of 3)
- Developing a Fall-Prevention Program
- Coding, billing, and documentation tips for teaching physicians, interns, residents, and students
- Coding tip: Watch for different codes for SI joint injections
- Searched