This is the second installment of a two-part blog mini-series where I share the tricks of the trade with detailed tips surrounding 7 essential “train the trainer” categories. Missed the first half? No worries, you can check it out here: 7 Tips to Cultivate Your Trainer, Part 1 of 2.
Hayes' Healthcare Blog
Preparing your trainer to deliver an impactful learning experience is essential for getting the most return on your training program. Aside from the curriculum, learn how to inspire, groom, and mentor your trainer to enhance your program and promote skill set growth. A good teacher mixed with a thoughtful technique can make the difference in what learners retain.
This is the first of a two-part blog mini-series where I share the tricks of the trade with detailed tips surrounding 7 essential “train the trainer” categories.
In last week’s blog Angela Hunsberger outlined the importance of cleaning up the insurance carrier list to ensure efficiency to maximize payor reimbursement. More than consolidating an old list, she explained the nuances of paper vs. electronic claim submission and suggested partnering with the billing team to tackle the list.
Continued in Part 2 of a two piece post, Angela provides an instructional roadmap detailing six steps of insurance carrier cleanup. This article will provide the knowledge and tools needed to revamp carrier settings and revel in the financial payoff of a job well done.
Insurance submission and processing has evolved over the past decade transitioning from printing paper claim forms to an electronic workflow. Adaptations include the NPI implementation, using a new standard paper claim form, sending more electronic claims as payors offer connections (or even refuse paper claims), moving to the ANSI 5010 electronic claim submission format, and most recently transitioning to ICD10. Considering those changes, along with the flurry of your other projects, have you audited your insurance carrier setup lately to ensure it is configured to maximize revenue cycle efficiency? By efficiency, I am referring to leveraging technology you are already paying for to get the most bang for your buck and maximize payor reimbursement.
Some people may think cleaning up the carrier list is a grueling meaningless chore and a waste of valuable time. On the contrary, the payoff is quick and it’s in real dollars and cents so you will want to reap the benefits by tackling the list at full speed. The outcome is not simply to consolidate an old insurance carrier list; it is much more dynamic than that. This blog, the first part of a two piece post, will explain what to look for and why. Read on my friend.
The decision to bring in a consulting company is not a simple one. Most organizations follow a procedural protocol to examine immediate needs against internal bandwidth and ability. Often it’s necessary to involve experienced subject matter experts to see a project through completion. Regardless of the justification to engage an external partner, one must be cognizant over the cost to bring in such a qualified consultant (or team of consultants). Following these tips will ensure you get the most bang for your consulting bucks.
More than ever, technology is a mainstay in delivering healthcare. Demand for services and solutions are in full swing thanks to incentive program participation, the shift in outcome-based pay models, and practices affiliating with hospital networks. For many practices, fluctuating program guidelines combined with the rushed pace of technology adoption has resulted in an overconsumption of software products. Focusing on a moving target makes it difficult to spot areas that could be unnecessarily costing your organization a significant amount of money. The next few paragraphs will reveal how to identify opportunities to save on healthcare IT costs. The advice is free and the payoff is priceless.
Early in my career, I worked for two providers in a small privately-owned practice in the Midwest. For seven years I sat behind the front desk scheduling patients, checking them in, updating demographics, and filing insurance claims. My manager trained me to be thorough and accurate but yet I had no clue how truly significant my actions impacted our bottom line. Back then, the most important thing to remember was to obtain a good address so we could send a bill if needed. Boy, was I short-sighted.
Picture a road race with no finish line. I envision it would look similar to the bewildered faces of patients leaving your office without stopping at a checkout desk. Without closure from their appointment, your patients may have trouble explaining details to their loved ones when they get home or have likely forgotten the next steps. They may have the clinical summary printout in their hand, but closing the patient’s appointment is more than providing a list of instructions and showing them the door.
Over the past decade rapid changes in healthcare technology have caused a whirlwind of medical software adoption, and, in some cases, an overconsumption of ancillary products. Medical practices have implemented EHRs, patient portals, and secure messaging to participate in programs such as Meaningful Use and Patient Centered Medical Home certification.
Even though the technology is in place, your staff may still be digesting the impact to current workflows resulting in the full product not being utilized. Now is the time to optimize product features and reap benefits far beyond just meeting minimum program requirements. One specific area of optimization frequently overlooked is secure messaging. So how can you leverage secure messaging in your practice?
To meet Meaningful Use, you’ve either implemented a patient portal or plan to do so in the near future. Perhaps you’ve rolled out your portal with limited functionality but now plan to optimize the technology to increase both patient and staff engagement. Regardless of which stage of Meaningful Use you are in, you need to weigh the challenges of portal engagement and patient privacy.
Patient portals require an extra layer of privacy. The goal is to make the portal as user-friendly as possible so that patients will use it while maintaining the security and privacy of all of your patients. So how do you strike the right balance?