Are You Registered for the December Provider Webinar?

Partners’ Provider Webinar is a great way to learn important information and detailed updates that impact daily operations, without having to leave your office!

Partners will host its next Provider Webinar on Wednesday, December 13, 2017 at 1 p.m. To register, click here. Registrants will receive an email confirmation containing the webinar link.

Some of the topics on the agenda include:

  • Program Integrity’s Role in Behavioral Health Care
  • Care Coordination VS. Case Management: Perceptions and Expectations
  • Disaster Plan
  • Compliance, HIPAA Privacy, and Security
  • Innovations Rights Restrictions
  • IDD State Funded Waitlist Process
  • Credentialing

We want your questions! If you have a question about the topics scheduled for discussion, or any provider operations matter, please email your question to questions@partnersbhm.org.

Want to view previous webinars? Visit https://providers.partnersbhm.org/provider-webinars/.

‘Tis the Season for Cybercriminal Activity!

Holiday lights, delightful decorations, and… cybercriminal activity? The holidays are a time of joy and happiness for most, but for some, it’s a time to prey on vulnerabilities. As we approach both the holiday and tax season, it is important to be ever so cautious and alert. Below are some scams to keep an eye out for:

  1. Beware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees.
  2. Look out for fake purchase invoices
  3. Shipping status malware messages: fake shipping notifications
  4. Be cautious of email deals: not all email sales or flyers are going to be legitimate.
  5. Look deeper at links and URLs: take a second look at the address bar (avoid fake retail site)
  6. Keep an eye on your bank account
  7. Fake Surveys: surveys sent out promising money or gift cards.
  8. Fake Charities

Don’t Be Lured into A Phishing Scam—Know the Signs

How can you tell the different between a legit email and a phishing scam? Here are some things to watch for:

  • Grammatical errors: A person or individual may make the occasional typo in their emails. However, companies that phishers try to imitate, like Amazon and MasterCard, can afford to hire editors who catch those mistakes.
  • Emails that are formatted differently than normal: It’s one thing for a website or logo to get a facelift, but it’s another for a company that would normally have purchase information in the body of the email to put it in a .zip attachment. Additionally, if taken to a website, certain nuances of a site, like images not loading and boxes not lining up, should raise red flags.
  • Unusual web addresses: Check the website address in the address bar and make sure you are at the correct website. If the address is unusual or different from what you are accustomed to seeing when interacting with a company, close your browser.
  • Your credit card/bank is asking for information they already have: Your bank has your account information and contact information. Your credit card company knows your account number, the exact spelling of your name as it appears on the card, the security code, the billing address, and expiration date. They will never ask you for all of that information. Depending on the scope, they typically would ask for one or two pieces of identifiable information and a security question for verification. If in doubt, call the company in question and speak to a representative. They will be able to tell you if it’s a legitimate email or not.

How to Protect Yourself from Cybercriminal Activity

  1. Be a skeptic: Never click on links or attachments unless it’s from a trusted source.
  2. Stay up to date: Update your software passwords, and never save them in your browser.
  3. Familiarize yourself with the latest information technology trends

Make sure to protect your online information, both personally and professionally, for both yourself and your organization. You do not have to be a retail organization to fall victim to those seeking vulnerabilities. Data is perhaps more valuable than money to some.