<img src="https://secure.insight-52.com/805485.png" style="display:none;">

Latest Articles

The latest news and information regarding electronic medical records, practice management software, HIPAA, and security from Nextech.

Nextech

Blog Feature

Plastic Surgery | Regulatory & Compliance

By: Nextech
February 23rd, 2015

Medical coding is a shared language that allows clinicians, insurers, and government agencies to effectively share information about a patient’s health. The coders in a plastic surgery practice use codes to communicate diagnoses and treatment procedures to payers.

P+ ICP MPV-3

Get the latest Nextech blogs delivered straight to your inbox:

Blog Feature

Ophthalmology | Regulatory & Compliance

By: Nextech
February 20th, 2015

Coding is the common language that allows ophthalmology clinicians, insurance companies, and government agencies to share and understand information about a patient’s health.

Blog Feature

Dermatology | Regulatory & Compliance

By: Nextech
February 19th, 2015

ICD-10 codes enable dermatology clinics, insurance companies, and government agencies to share information about a patient’s condition. They organize a tremendous number of dermatology diagnoses into a standardized format all three stakeholders can understand. ICD-10 stands for the 10th revision of the International Classification of Diseases, created and maintained by the World Health Organization. WHO further divides diagnoses into ICD-10-CM (primarily used in outpatient and clinical settings) and ICD-10-PCS (primarily used in inpatient and hospital settings). Just as ICD-10 codes classify diseases, CPT codes classify procedures. Coders in a dermatology practice need to be well trained in both coding languages. Note: This content has been updated since the original publish date.

Blog Feature

Security & Data Management | Healthcare Technology

By: Nextech
February 17th, 2015

Part 3: The G20 & DoD Hacks The cybersecurity firm Kaspersky Labs announced this morning that a team of criminal hackers have stolen an estimated total of $1 billion from over a hundred banks in at least twenty-five different countries (including the U.S.), in what security experts are calling one of the largest bank heists in history. Kaspersky representatives are quoted as saying it is “by far the most successful criminal cyber campaign we have ever seen.” Exactly how the hackers gained access to so many bank networks has yet to be disclosed, but some theorize that spear-phishing emails or unauthorized password sharing are possible causes. Then again, the cause might be the same as that of the two hacks we’ll be discussing in this third and final installment—the 2013 G20 Incident and the Department of Defense (DoD) Worm Infection—both of which were the result of mobile storage devices infected with malware.

Blog Feature

Patient Engagement

By: Nextech
February 16th, 2015

Medicine is a field that presents a unique host of challenges when it comes to marketing. It is vital to the health and longevity of your practice, whether it be a specialty-driven office or a general practitioner, that you not only retain current clients but also regularly attract new ones. Many individuals within the medical field might be surprised to learn that word of mouth marketing can still make a difference in today's high tech world. Though it may seem somewhat outdated, this form of communication and advertising is still incredibly valuable for doctors looking to grow their client base and boost patient retention. Take a look at a few factors to consider when approaching word of mouth marketing.

Blog Feature

Security & Data Management

By: Nextech
February 13th, 2015

Part 2: The Snowden Incident In Silicon Valley today, President Obama is hosting a White House summit on Cybersecurity. A gathering of top tech experts will be there to give lectures and provide input on the subject, including Apple CEO Tim Cook. However, a large number of the best-known senior tech executives will be notably absent from the summit—Mark Zuckerberg (Facebook), Marissa Mayer (Yahoo), Larry Page (Google), Eric Schmidt (Google), and even Bill Gates (Microsoft) all chose to decline their invitations. All of them sent corporate information security officers to attend in their steads.