“Kentucky REC has been one of the best learning environments and innovative programs I have encountered throughout this healthcare transformation journey that effectively met the needs and improved our organization. I was impressed with how quickly they implemented suggestions from feedback to make our continued learning process truly catered to the needs of the cohort. Our advisors are always so positive and encouraging even if we simply needed a supportive voice to motivate. Our advisors were readily available to answer any question we had or to promptly get questions answered, communicate changes, navigate some of those changes alongside us, and cultivated a trusting relationship with our practice to overcome any barriers or challenges we encountered. Through the Kentucky REC, we were able to apply PCSP principles in ways that were meaningful to our organization, our staff, and the patients we serve.”
The Patient-Centered Specialty Practice (PCSP) is a National Committee for Quality Assurance (NCQA) recognition program that extends the Patient-Centered Medical Home (PCMH) concepts to specialists. Specialty practices committed to access, communication and care coordination can earn accolades as the “neighbors” that surround and inform the medical home and colleagues in primary care.
Our new PCSP Cohort will begin on August 4th and the next PCMH Cohort will begin on September 22nd. Please let us know if you would like to join or would like to request additional information. The cohort framework is designed to accelerate your journey to NCQA PCSP Recognition within a 14-16 month period. Through our expert training, coaching, and resources, your staff will be well-prepared to carry out the practice transformation process.
By receiving recognition as a PCSP, your organization will receive full points in the Improvement Activities category of the Merit-Based Incentive Payment System under the Medicare Access and CHIP Reauthorization Act (MACRA).
Don’t miss the opportunity to be a part of something special as we work to transform healthcare in Kentucky! Call us at 859-323-3090 for more information.
This year’s 2017 Healthcare Transformation Survival Seminars will provide a heavy focus on Medicare Access and CHIP Reauthorization Act (MACRA) legislation and the Quality Payment Program.
The topics will include:
- MACRA Quality Payment Program 2.0 Sessions: Preparing for QPP
- Getting Ready for QPP – Who is Eligible?
- How & What Should I Report for QPP?
- Which Measures Should I Report for QPP?
- Which Improvement Activities Are Right for Me?
- How do I Meet the ACI Requirements?
- Health IT Sessions:
- How do I Handle Medicaid Meaningful Use?
- What About Hospital Meaningful Use?
- What Role Does HIE Play in MU & ACI?
- How Do I Protect my IT Systems from Bad Guys?
- How Do I Improve my Performance & QPP Score?
Lunch will be provided!
This activity has been approved for AMA PRA Category 1 Credit™
August 18, 2017 – London, KY
London Community Center
529 S Main St
London, KY 40741
9:30AM – 3PM EST
September 14, 2017 – Georgetown, KY
100 Crawford Drive
Georgetown, KY 40324
9:30AM – 3PM EST
September 28, 2017 – Paducah, KY
Baptist Health Paducah
Heart Center Auditorium
2501 Kentucky Avenue
Paducah, KY 42003
9:30AM – 3PM CST
October 5, 2017 – Ashland, KY
Ashland Community College
The Rocky Adkins Pavilion
902 Technology Drive
Grayson, KY 41143
9:30AM – 3PM EST
Clinicians/Practice Representatives/Non-profit organizations: $25
Vendors and Non-Practice Representatives: $75
This material will be prepared by the QPP Resource Center, the Quality Payment Program for the Midwest, under contract with the Centers for Medicare & Medicaid Services (CMS), an agency of the U.S. Department of Health and Human Services. The contents presented do not necessarily reflect CMS policy.
Web Event: The Mechanics of MIPS Data Submission Options
As you participate in MIPS, you should also consider the mechanism of how you will submit your data to CMS. The Quality Payment Program’s Small, Rural and Underserved Support (SURS) program is hosting an online event to help you understand your options for data submission.
Two sessions of this presentation are being offered. Please click the date and time below to register for the session you would like to attend:
View webinar flyer here: QPP-SURS AugWebinar flyer.
This event is being hosted by the QPP SURS Central Support Team, you may contact them at: email@example.com
CMS recently released a notice of proposed rule-making (NPRM) for program changes to the Quality Payment Program under MACRA (Medicare Access and CHIP Reauthorization Act of 2015). You can read the press release here.
The federal register version is over 1000 pages and there are some significant changes. Most of these changes will affect Year 2 of the Quality Payment Program, not the current Year 1 requirements.
Some of these changes are to bring the Quality Payment Program into alignment with the 21st Century Cures Act. This act was passed in December 2016 after the MACRA final rule was released.
The fact sheet is available here. Contact the Kentucky REC with your questions. Our expert advisors are here to help. Call us at 859-323-3090.
The U.S. government is aware of an international ransomware campaign that may be affecting Healthcare and Public Health Sector assets in addition to other Sectors. Please review the information below and share with colleagues.
You may send additional questions to firstname.lastname@example.org
HHS/ASPR Critical Infrastructure Protection Program:
If you are the victim of a ransomware attack
If your organization is the victim of a ransomware attack, HHS recommends the following steps:
1. Please contact your FBI Field Office Cyber Task Force or US Secret Service Electronic Crimes Task Force immediately to report a ransomware event and request assistance. These professionals work with state and local law enforcement and other federal and international partners to pursue cyber criminals globally and to assist victims of cyber-crime.
2. Please report cyber incidents to the US-CERT and FBI’s Internet Crime Complaint Center.
3. **NEW** If your facility experiences a suspected cyberattack affecting medical devices, you may contact FDA’s 24/7 emergency line at 1-866-300-4374. Reports of impact on multiple devices should be aggregated on a system/facility level.
4. For further analysis and healthcare-specific indicator sharing, please also share these indicators with HHS’ Healthcare Cybersecurity and Communications Integration Center (HCCIC) at HCCIC@hhs.gov.
Mitigating against this threat
• Educate users on common Phishing tactics to entice users to open malicious attachments or to click links to malicious sites.
• Patch vulnerable systems with the latest Microsoft security patches here.
• Verify perimeter tools are blocking Tor .Onion sites
• Use a reputable anti-virus (AV) product whose definitions are up-to-date to scan all devices in your environment in order to determine if any of them have malware on them that has not yet been identified. Many AV products will automatically clean up infections or potential infections when they are identified.
• Monitor US-CERT for the latest updates from the U.S. government. See below for current reporting.
• Utilize HPH Sector ISAC and ISAO resources. See below for further information.
Multiple Petya Ransomware Infections Reported
06/27/2017 12:56 PM EDT
Original release date: June 27, 2017 US-CERT has received multiple reports of Petya ransomware infections occurring in networks in many countries around the world. Ransomware is a type of malicious software that infects a computer and restricts users’ access to the infected machine until a ransom is paid to unlock it. Individuals and organizations are discouraged from paying the ransom, as this does not guarantee that access will be restored. Using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats, such as ransomware.
Petya ransomware encrypts the master boot records of infected Windows computers, making affected machines unusable. Open-source reports indicate that the ransomware exploits vulnerabilities in Server Message Block (SMB). US-CERT encourages users and administrators to review the US-CERT article on the Microsoft SMBv1 Vulnerability and the Microsoft Security Bulletin MS17-010. For general advice on how to best protect against ransomware infections, review US-CERT Alert TA16-091A. Please report any ransomware incidents to the Internet Crime Complaint Center (IC3).
Sector ISAO and ISAC resources
National Health Information-Sharing and Analysis Center has shared the following TLP-White Message and will continue to share information at nhisac.org.
HITRUST has shared the following Threat Bulletin for distribution.
ONC and OCR resources
• ONC provides many helpful resources about Health IT Security to include cybersecurity guidance materials and training here and here.
• OCR provides cybersecurity guidance materials including a cybersecurity checklist, ransomware guidance and cyber awareness newsletters here.