Hospice Insights Podcast - Hospice Audit Updates: David Beats Goliath
Compliance Tip of the Day: Middle Managers as the Eyes and Ears of Compliance
Episode 365 -- Four Sanctions Cases Everyone Should Know
UPIC Audits
Compliance Tip of the Day: The role of Compliance in Auditing AI
California Employment News: Taking Advantage of the PAGA Reform – How Employers Can Lower Their Risk of PAGA Liability
Auditing Your Hotline and Case Management System
Hospice Insights Podcast - Controlling the Narrative: A New Tactic for Auditors and ALJs
Improving Your Code of Conduct
Now Is the Time to Conduct I-9 Audits: What's the Tea in L&E?
Preparing for — and Surviving — an OFCCP Audit
Hospice Insights Podcast - Meet the New Laws, Same as the Old Laws: Overpayment Recoupment Update
AGG Talks: Home Health & Hospice Podcast - Episode 6: Navigating the Audit Maze: Insights From Northeast Georgia Health System
Hospice Insights Podcast - What's the Latest on UPICs? Highlights From Recent Audit Activity, Part II
5 Key Takeaways | 2024 Emerging Trends: Delaware Unclaimed Property VDA and Multistate Audits
Common Scenarios Triggering False Claims Act Violations, Part 3: Claims and Investigations
Compliance Tip of the Day: Machine Learning for Internal Audit
DE Under 3: OFCCP Changes Up Important Technical Details of its Audit Selection Process in First FY 2024 CSAL
Preparing for a Government Healthcare Audit
What Can A Tax Attorney Do For You? A Podcast With Janathan Allen
Recent enforcement actions, audit activity, proposed rulemakings, and guidance issued by the U.S. Department of Health and Human Services (“HHS”), Office for Civil Rights (“OCR”) highlight the agency’s focus on health data...more
In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
Companies are increasingly choosing not to pay ransom for ransomware and extortionware due to the growing associated risks. In fact, a recent report by crypto-crime analyst firm Chainalysis found that payments to threat...more