New National Resource Guide to Support Hospitals Affected by Change Healthcare Cyberattack

HHS Unveils Health Plan Resource Guide to Support Hospitals and Providers Affected by Cyberattack

Hospitals and providers affected by the Change Healthcare cyberattack can now access a national resource guide of health plan contact information, thanks to the Departments of Health and Human Services (HHS), Administration for Strategic Preparedness and Response (ASPR), and Centers for Medicare & Medicaid Services (CMS). The guide aims to provide support to healthcare providers who are still facing disruptions due to the unavailability of the Change Healthcare platform.

In a letter introducing the guide, HHS, ASPR, and CMS highlighted the challenges faced by healthcare providers as a result of the cyberattack. They encouraged hospitals and health systems to review the voluntary cybersecurity performance goals that were released earlier in the year. These guidelines aim to help providers stay informed and take necessary precautions against cyber threats in the future.

For up-to-date information on the cyberattack, healthcare organizations can visit the AHA Change Healthcare cyberattack update webpage. This page includes valuable resources such as announcements from CMS on accelerated and advance payments for hospitals and physicians affected by the cyberattack, frequently asked questions related to these payments, and an informational bulletin on actions states can take to provide relief to Medicaid providers impacted by the cyberattack.

For any further questions or assistance, healthcare organizations can contact Molly Smith, AHA group vice president of policy, at mollysmith@aha.org. It is essential for healthcare organizations to remain informed, prepared, and vigilant in dealing with cybersecurity threats to ensure continuity of patient care.

In conclusion, healthcare organizations must be proactive when it comes to protecting their systems against cyber threats. By following best practices such as staying informed about potential vulnerabilities in their systems and implementing strong security measures, they can mitigate risks before they become significant problems.

Leave a Reply