Organisations across the Asia-Pacific (APAC) region are relying on job postings, internships and even candidates from other fields to plug the cyber security talent gap, a study has found.
Those were the key findings of the APAC cybersecurity hiring managers research report by The International Information System Security Certification Consortium, or (ISC)², which polled 787 respondents across Singapore, Hong Kong, Japan and South Korea.
Over half of respondents (58%) in Singapore rely on standard job postings in their search for cyber security talent, while just under half in the city-state have identified or recruited talent through apprenticeship and internship programmes as well as recruitment agencies.
At the regional level, companies have also diversified their recruitment practices when it comes to candidate sourcing, with hiring managers turning to existing employees from non-traditional IT departments such as customer service (43%) and human resources (38%) for entry-level and junior-level staff.
“Our research findings point to the widening cyber security workforce gap, which has been driven by geopolitical tensions, macroeconomic instability, as well as growing physical security challenges,” said Clar Rosso, CEO of (ISC)².
“With APAC registering the second highest year-on-year rise in shortage globally, organisations in the region need to be creative with their cyber security hiring. However, unlike conventional thinking, adopting an innovative approach doesn’t mean organisations have to take on more hiring risks.”
The (ISC)² report noted that adopting a more collaborative hiring approach between HR and cyber security teams, identifying candidates with relevant attributes and skills, as well as investing in their professional development, can help organisations build more resilient and sustainable cyber security teams.
When it comes to skills and experience, 62% of respondents would hire a candidate self-taught in IT or cyber security despite having no work experience, with those in Singapore and Hong Kong most likely to consider such candidates.
Across the region, 64% of hiring managers ranked previous professional experience as one of the most important attributes, followed by technical skills (56%) and certifications (51%).
Data security (34%) and security administration (32%), as well as the ability to work effectively in a team (48%) and independently (33%), emerged as the most highly rated technical and non-technical skills hiring managers expect from candidates.
The vast majority of hiring managers surveyed also indicated that their organisations provide some form of professional development for their entry-level and junior-level staff. This ranges from certification training and courses to the sponsorship of certification test fees, as well as mentorship programmes.
In-house training courses are considered the most effective method of talent development for entry-level and junior-level practitioners (60%), followed by external training courses (57%), certifications (47%), conferences (35%) and mentoring (35%).
But retaining young talent is just as critical, particularly in markets such as Australia and New Zealand (ANZ). A separate study by Lacework in ANZ found that those with less than a year of experience are more likely to leave (64%) than those with one to two years’ experience (44%).
The Net Promoter Score (NPS) – a measure of customer or employee loyalty – for cyber security was also very low at -9.4, putting the industry on par or worse than airline and insurance sectors.
Worryingly, for those in the field for two years or less, the NPS was -32, showing that those new to the industry are having a negative experience and are even less likely to recommend cyber security as a career.
“New, talented individuals are leaving the cyber security industry too fast. To retain crucial talent in a tight market, more needs to be done to reduce the workload and stress on all those in the industry, particularly newcomers. This is especially so given the rapid rate of change in the sector and mounting public pressure from exact high-profile security breaches,” said Richard Davies, area director for ANZ at Lacework.
(KTLA) — A quick online search can reveal personal details on just about anyone.
“It’s just so much easier to find on the internet, and it is a huge invasion of privacy,” said Hayley Kaplan, a cyber security expert.
Now, a new tool from Google seeks to help.
It’s called Results About You, and it makes it easy to request the removal of search results that contain your phone number, home address or email.
“We’re giving you even more control over your online presence. Let’s say you come across a result that contains your personal contact information that you don’t want public. With this tool, right from the Google app, you can easily request the removal of search results that contain your phone number, home address or email address, said Prabhakar Raghavan, senior vice president of Search at Google at the company’s exact Search On 22 livestream.
Keep in mind, it’s not a complete solution.
“Even though removing these results doesn’t scrub your contact information from the web overall, we’re doing everything to safeguard your information on Google search,” said Raghavan.
To use it, search for yourself on Google and locate a result containing personal information.
Next, hit the three dots next to the result. Then look for the button labeled “Remove result” and tap it.
Google will ask you some questions about why you’d like the result removed. Once you answer them, you’ll have to wait a few days for a response from Google about whether they can remove the result.
You can also watch this Reel on Instagram that explains the step-by-step process.
“It’s an exceptional first step by Google,” said Kaplan, who helps people reclaim their privacy online. “It’s critical that you care. That information can be used against you in so many different situations.”
Kaplan said personal information on the web can be used for identity theft and ageism, then there’s the personal safety aspect and protecting yourself against people with malicious intent.
She said Google’s tool is helpful, but it’s just a start.
“It’s always best to remove it from the source if you can,” said Kaplan, who provides takedown information on her website.
A service called Delete Me has DIY opt-out guides for popular sites including Spokeo, Whitepages and MyLife.
Discover has a free feature for customers in their mobile app called Online Privacy Protection. They’ll scan for your personal info and submit opt-out requests on your behalf every three months.
“I do think you want to be very careful every time you supply out personal information. You need to understand that there’s a consequence,” concluded Kaplan.
Keep in mind that Google’s tool is still rolling out, so not everyone will have access to it right away. Next year, Google will let you sign up for alerts that tell you when new results containing your personal info hit the web.
When people worry about their data privacy, they usually focus on the Big Five tech companies: Google, Apple, Facebook, Amazon, and Microsoft. Legislators have brought Facebook’s CEO to the capitol to testify about the ways the company uses personal data. The FTC has sued Google for violating laws meant to protect children’s privacy. Each of the tech companies is followed by a bevy of reporters eager to investigate how it uses technology to surveil us. But when Congress got close to passing data privacy legislation, it wasn’t the Big Five that led the most urgent effort to prevent the law from passing, it was a company called RELX.
You might not be familiar with RELX, but it knows all about you. Reed Elsevier LexisNexis (RELX) is a Frankensteinian amalgam of publishers and data brokers, stitched together into a single information giant. There is one other company that compares to RELX—Thomson Reuters, which is also an amalgamation of hundreds of smaller publishers and data services. Together, the two companies have amassed thousands of academic publications and business profiles, millions of data dossiers containing our personal information, and the entire corpus of US law. These companies are a culmination of the kind of information market consolidation that’s happening across media industries, from music and newspapers to book publishing. However, RELX and Thomson Reuters are uniquely creepy as media companies that don’t just publish content but also sell our personal data.
Despite being a billion-dollar data and information business—just one of RELX’s brands, alone, has profit margins that rival Apple, Google, and Amazon’s—RELX doesn’t get the same level of public scrutiny that those other companies do. It’s likely easier for most of us to ignore RELX and its industry counterparts than it is to ignore the social media and online shopping platforms that we use every day. We visit the Big Five companies’ platforms whenever we want to read the news, catch up with friends, shop, or look something up. Most of us don’t have such an intimate user relationship with RELX, even if we do legal research on Lexis, read Elsevier journals, or use LexisNexis personal data services at work. Even if you don’t feel like you have close, personal ties to RELX, one of the company’s dossiers probably has your name on it—and that information may be used to make decisions about your everyday life.
On one end of the informational spectrum, companies like RELX exploit a lack of data privacy laws to make millions of dollars building data products to sell to cops, your employer, your landlords, your insurance companies, and all sorts of other institutions and overlords. These companies and institutions use RELX’s “risk” products to make decisions about whether you should get hired for a job, have custody of your children, have access to certain types of medication, and even whether you will be detained or arrested. RELX’s LexisNexis products have helped the government spy on protesters’ social media accounts and surveil immigrants. Police have abused LexisNexis systems to spy on exes and even to blackmail women using the personal information the company’s policing products provide. Using RELX products for data surveillance is problematic because the company funnels a deluge of unfiltered, unvetted data through biased data-processing algorithms. The combination of bad data and bad algorithms leads to government systems that bake historically racist, xenophobic policing practices and outcomes into a Minority Report-like digital policing dystopia.
The companies’ error-riddled data has prevented people from accessing their own bank accounts and getting insurance, and from being able to rent homes. The mistakes in RELX’s data make it all the more worrisome. RELX is growing its list of data analytics products, and is even developing technology that makes predictions about your health based on your private medical records, assessing your health risks for insurers and your doctors. Imagine what could happen to your health care access if you were wrongly tagged as at risk for opioid abuse or as having a certain chronic illness.
The companies can “double-dip” with their data assets, selling raw data and also selling structured information made from that raw data. For instance, RELX’s Elsevier sells academic journal articles, and it also creates research “metrics” products with data gathered by tracking the activities and associations of its authors, and also by surveilling who is accessing articles and what they’re doing with them. These metrics products predict which researchers, and which research projects, will have the most “impact.” Such rankings help grant funders divvy out money and institutions decide which hires will make them appear the most prestigious. Academic metrics take scientific decisions out of the hands of scientists whose expertise should lead scientific decisionmaking. They also turn universities and grant funders into rich data sources for the analytics companies.
In context: Remote apps for cars are a great convenience. I love remotely starting my Subaru Legacy to allow it to warm up for a bit now that the weather is getting chilly. However, these features are not without some risk. Some are calculated. For example, you can limit the chances of car theft by not unlocking or starting the car unless you have a direct line of sight. Other threats are out of your hands, like the security of the remote app.
Those convenient remote car apps that allow you to start, unlock, honk, and even locate your car from your phone might not be as secure as you thought. Hackers figured out a way to do all those things without needing your login credentials.
The trick worked for several makes, including Acura, Honda, Infiniti, and Nissan vehicles. It might also work on BMW, Hyundai, Jaguar, Land Rover, Lexus, Subaru, and Toyota since they all use the same telematic provider. The list of cars was so broad because it seems that SiriusXM is the company handling remote services for all of these manufacturers.
The hackers were unaware that SiriusXM was even in this line of business, as it is better known for its satellite radio functionality. However, if you own any of those makes, you are probably already aware that SiriusXM is behind your car's remote services since you have to create an account to use them.
Self-proclaimed hacker, bug bounty hunter, and Staff Security Engineer for Yuga Labs Sam Curry explained in a Twitter thread that all he and his team needed to access any driver profile was the car's vehicle identification number (VIN). This code is unique to all cars. However, it is easily accessed with a stroll through any parking lot since it is visible through the windshield on the dash of most vehicles.
It took the researchers a while to back-engineer the apps, but since SiriusXM put all its eggs in one basket, they needed only one for a proof-of-concept — NissanConnect. They contacted someone who owned a Nissan and borrowed their credentials to dig further into the authentication process.
The apps work by communicating with a domain owned by SiriusXM, not with the car manufacturer, as one would intuitively think. Through trial and error, Curry found that the only parameter that the NissanConnect app and the hosted authentication server cared about was "customerId." Changing other fields, like "vin," had no effect.
During its snooping, the team discovered that the customerId field had a "nissancust" prefix and a "Cv-Tsp" header that specified "NISSAN_17MY" for the test vehicle. If they changed either of these variables, requests failed. So they put that endpoint on the back burner and concentrated on others.
Several hours later, the researchers encountered an HTTP response that had a "vin format [that] looked eerily similar to the "nissancust" prefix from the earlier HTTP request." So they tried sending the VIN-prefixed ID as the customerId. Surprisingly, it returned a bearer token, which was something of a eureka moment. They tried using the bearer token to send a fetch request for the user profile, and it worked!
The researchers accessed various customer information via HTTP, including the victim's name, phone number, address, and car details. Using this as a framework, they created a python script to access the customer details of any VIN entered. More poking and prodding led Curry to find that he could not only view account information but also use the access to send command requests to the car.
"We could execute commands on vehicles and fetch user information from the accounts by only knowing the victim's VIN number, something that was on the windshield," Curry tweeted. "We were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number [sic] of the car."
Furthermore, the API calls for telematic services worked even if the user no longer had an active SiriusXM subscription. Curry also noted that he could enroll or unenroll vehicle owners from the service at will.
Don't panic if you have one of these makes and use its remote functionality. Yuga Labs contacted SiriusXM about the gaping security hole, and it immediately issued a patch before the researchers announced the vulnerability earlier this week.
REGINA, Saskatchewan, Nov. 02, 2022 (GLOBE NEWSWIRE) -- The Board of Directors (the “Board”) of Information Services Corporation (TSX:ISV) (“ISC” or the “Company”) today declared a quarterly dividend of $0.23 per Class A Limited Voting Share ("Class A Share"). The dividend will be paid on or before January 15, 2023 to shareholders of record as of December 31, 2022.
The dividend has been designated as an eligible dividend pursuant to the Income Tax Act. An eligible dividend paid to a Canadian resident is entitled to the enhanced dividend tax credit. For further information on tax implications, please consult a tax advisor.
Headquartered in Canada, ISC is the leading provider of registry and information management services for public data and records. Throughout our history, we have delivered value to our clients by providing solutions to manage, secure and administer information through our Registry Operations, Services and Technology Solutions segments. ISC is focused on sustaining its core business while pursuing new growth opportunities. The Class A Shares of ISC trade on the Toronto Stock Exchange under the symbol ISV.
Cautionary Note Regarding Forward-Looking Information
This news release includes certain forward-looking information within the meaning of applicable Canadian securities legislation including, without limitation, expectations with respect to payment of dividends. Forward-looking information involves known and unknown risks, uncertainties and other factors that may cause actual results or events to differ materially from those expressed or implied by such forward-looking information. Important factors that could cause actual results to differ materially from the Company's plans or expectations include risks relating to changes in the condition of the economy, including those arising from public health concerns, reliance on key customers and licences, dependence on key projects and clients, securing new business and fixed-price contracts, identification of viable growth opportunities, implementation of our growth strategy, competition and other risks detailed from time to time in the filings made by the Company including those detailed in ISC’s Annual Information Form for the year ended December 31, 2021 and ISC’s Unaudited Condensed Consolidated interim Financial Statements and Notes and Management’s Discussion and Analysis for the third quarter ended September 30, 2022, copies of which are filed on SEDAR at www.sedar.com.
The forward-looking information in this release is made as of the date hereof and, except as required under applicable securities legislation, ISC assumes no obligation to update or revise such information to reflect new events or circumstances.
Senior Director, Investor Relations & Capital Markets
Toll Free: 1-855-341-8363 in North America or 1-306-798-1137
Women in CyberSecurity (WiCyS) is partnering with the International Information System Security Certification Consortium (ISC)2 to help others navigate an entry point into cybersecurity learning through its Certified in Cybersecurity Winter Camp.
COOKEVILLE, Tenn., Nov. 17, 2022 /PRNewswire-PRWeb/ -- Women in CyberSecurity (WiCyS) is partnering with the International Information System Security Certification Consortium (ISC)2 to help others navigate an entry point into cybersecurity learning through its ISC2 Certified in Cybersecurity Winter Camp.
WiCyS aims to reduce confusing barriers for women and underrepresented populations in order to acquire and succeed in a cybersecurity career. (ISC)2 is a nonprofit organization that specializes in training and certifications for cybersecurity professionals. This new camp provides entry-level certification for IT professionals, career changers, college students, exact college graduates, advanced high school students and exact high school graduates.
"Creating an inclusive space and entry point for women interested in cybersecurity is one of many areas we focus on. Bringing the enthusiasm of the WiCyS community together to learn and grow in a certification program is the key to successful outcomes. We are excited to partner with (ISC)2 to provide this winter camp to 250 outstanding ladies as they launch themselves into their cybersecurity career journeys," states Lynn Dohm, WiCyS executive director.
Prerequisites, previous cybersecurity work experience and/or formal cybersecurity education is not required to enroll in this program. This Winter Camp will provide participants with evaluating experience across five security domains, including security principles; business continuity; disaster recovery and incident response concepts; access controls concepts; network security; and security operations. Technical mentoring, open office hours, certification, and opportunities to receive WiCyS conference scholarships are included.
"As the cybersecurity threat landscape continues to evolve and become more complex, we need additional hands to help secure assets. Right now, we are facing a workforce gap that is at an all-time high, with 3.4 million more cyber professionals needed in the field. We won't make inroads into closing the workforce gap until we increase the access for new voices to enter the field, said Dwan Jones, Director, Diversity, Equity and Inclusion at (ISC)2. Specifically, we need to embrace greater diversity and work to add additional women to the profession. Community is at our core at (ISC)², and we are thrilled to broaden our community to the WiCyS network. This partnership will enable and amplify stronger efforts to recruit, retain and advance women in the cybersecurity workforce. Additionally, we are thrilled to extend our offering of One Million Certified in Cybersecurity to individuals in the WiCyS community looking to access the free Certified in Cybersecurity (CC) Online Self-Paced Training and exams. These efforts will strengthen the workforce and provide women with the foundational knowledge, skills and abilities to take on entry- and junior-level cybersecurity roles, enabling employers to more confidently build resilient teams across all experience levels."
This program is open to WiCyS members, international members, and those committed to completing the certification, which is a requirement. The deadline to register is Dec. 1.
For more information, visit https://www.wicys.org/benefits/isc2-certified-in-cybersecurity-certification/
Women in CyberSecurity (WiCyS) is a nonprofit organization with international reach dedicated to the recruitment, retention and advancement of women in cybersecurity. WiCyS was founded by Dr. Ambareen Siraj in 2013 through a National Science Foundation grant awarded to Tennessee Tech University. In less than 10 years, it has grown into an organization (est. in 2017) representing a leading alliance between trailblazers from academia, government, and industry. WiCyS offers opportunities, trainings, events, and resources for its members. Strategic partners include Tier 1: Amazon Web Services, Battelle, Bloomberg, Carnegie Mellon University – Software Engineering Institute, Cisco, Fortinet, Google, Intel, Lockheed Martin, Meta, Microsoft, Optum, Sandia National Laboratories, SentinelOne. Tier 2: AbbVie, Aristocrat, Dell Technologies, JPMorgan Chase & Co., LinkedIn, McKesson, NCC Group, Nike, Workday. To partner, visit http://www.wicys.org/support/strategic-partnerships/.
Lynn Dohm, Women in CyberSecurity (WiCyS), 815.530.7307, email@example.com
SOURCE Women in CyberSecurity (WiCyS)
CHARLESTON COUNTY, S.C. (WCSC) - The Charleston County Sheriff’s Office is looking for information on a decade-old murder.
Deputies say 49-year-old Nathaniel Gordon was playing cards on Nov. 9, 2012, at a home on Old Jacksonboro Road in Adams Run when someone knocked on the door.
Deputies say one of the other card players opened the door and immediately shut it when they saw someone on the other side with a gun.
At some point, a shotgun went off and Gordon was killed.
Deputies say it’s not clear if the gun was fired by someone inside the home or the person outside the door.
Anyone with information is asked to contact Det. Barry Goldstein at 843-554-2241 or Crimestoppers of the Lowcountry at 843-554-1111.
Copyright 2022 WCSC. All rights reserved.
Are you withholding information from your colleagues that could help them do their job better? If you are, you might be guilty of "quiet constraining."
Connor Campbell, a business-finance expert at NerdWallet, said failure to reveal more efficient ways to execute tasks has the potential to hinder growth and cause conflict in the workplace.
The phrase has been coined after Insider led the way on "quiet quitting" with an article in March about "coasting culture," or setting stronger work-life boundaries while still collecting a paycheck.
Kahoot! recently surveyed 1,635 employees in the United States and found that 58% of respondents admitted to holding onto information that could benefit their coworkers.
Just over three quarters of Gen Z workers, which Pew Research defines as those born after 1997, are the most likely to be guilty of "quiet constraining," the survey found.
Moreover, 95% of the respondents said they feel bored at work, compared to 87% of workers overall, primarily due to online employee training and virtual team meetings.
Campbell said there are ways businesses can help crack down on "quiet constraining."
He said it's important to introduce new employees to their colleagues. They should be told about new recruits and "given a run-down of their strengths and what they'll be bringing to the team. This makes the new member of staff less of a rival, and more of a team member," Campbell added.
He also suggested setting up one-on-one meetings or calls to help employees to get to know their colleagues better.
Starting the day with a group meeting can help set the tone for the rest of the day, along with setting expectations and tasks for the entire team.
"Business owners should remember that if they want to foster an information-sharing culture, this also applies to them," Campbell said.
Allow each staff member to have the opportunity to speak about any information they have gathered that they think would be useful to the team, and be sure to praise employees that share for doing so.
Managers can set up physical or online noticeboards to post important information.
Managers can share details posted in meetings, giving a boost to employees who that shared that information, Campbell said.
The secret to a successful team-building activity is identifying the reasons for communication breakdowns and selecting appropriate activities to target the problems, Campbell said.
"Forcing people to exercise against their will, for example, may actually do more harm than good, as employees will then associate the team with this negative experience."
"Understated ways that business owners can curb selfish thinking in the workplace is by introducing more group work rather than individual projects," Campbell said.
Group projects can also help to fully utilize all employees' strengths and specialties, leading to more respect among colleagues and generally helping staff feel more valued in the workplace.
Nov. 15—Without any new information or leads, Portland police are at a crossroads as they determine what to do next in the search for a 21-year-old Portland man who was reported missing this month.
Following the disappearance of 21-year-old Samuel Mugisha on Nov. 4, police have spent hours combing the 30 acres of woods behind Mugisha's North Deering apartment, as well as a park, railroad tracks and a river close to Mugisha's home.
Police had at least 20 officers looking for Mugisha at one time, a department spokesman said. With the help of other departments and the Maine Warden Service, police have used boats, all-terrain vehicles and a drone from the Brunswick Police Department to aid their efforts. But what they need most now is a new lead, otherwise, they're unsure of where to expand their search efforts.
"We're kind of taking everything into account," Portland police Maj. Robert Martin said Monday.
Mugisha's relatives said they were hoping to meet with police Tuesday to go over the case, but all on-duty officers were called to Portland High School for a hoax shooting report.
Police don't know why Mugisha left — if he intended to hitch a ride with someone and go out of state, if he was in an agitated state and was seeking comfort elsewhere, or if he just wanted to disappear. They don't know if he intended to harm himself.
None of the credit cards attached to Mugisha's name have been used not even to withdraw cash before he went missing, Martin said. Police aren't sure if Mugisha had a phone or trackable device on him at the time he left, and whether police might be able to retrieve data from those devices that will show a clearer picture of where he could be now.
Martin said police initially believed he left his cellphone behind. But after talking with family, officers learned it's possible Mugisha was wearing an Apple watch that connected to his phone, or that he could've had a second phone or another device.
Police and Mugisha's family members were hopeful over the weekend after receiving a tip that someone saw the young man hitchhiking near Rockport — however, after reviewing a high-quality image, Mugisha's relatives determined it was not him.
Claude Rwaganje, Mugisha's uncle, said Monday that the family is hoping the police can access his medical records from a psychiatric hospital he stayed at days before his disappearance. Martin said Monday that medical records are more difficult to access due to federal privacy laws, without a patient's consent.
Mugisha's family told the Portland Press Herald last week that he struggles with a mental illness that sometimes renders him non-verbal, and causes him to forget where he is and faint. His family believes his disappearance might be connected to his illness.
by Harvey L. Neiman Health Policy Institute
A new Harvey L. Neiman Health Policy Institute study found when patients are treated in the Emergency Department (ED) by non-physician practitioners (physicians assistants and nurse practitioners), there were 5.3% more imaging studies performed than if patients were seen only by physicians. This JAMA Network Open study was based on a nationally representative sample of Medicare fee-for-service beneficiaries with 16,922,274 ED visits between 2005 and 2020.
The increased imaging associated with non-physician practitioners was due to both a greater likelihood of an ED visit having imaging (3.4% increase). "While our study notes the correlation between the presence of non-physician practitioners in the ED with more imaging, it does not make any judgment about the efficacy of this increase in imaging," stated Eric Christensen, Ph.D., director of Economic and Health Services Research at the Neiman Institute. "The variation we found in practice patterns between physicians and non-physician practitioners highlights an opportunity to ensure the judicious use of imaging. These efforts need to address both when and what imaging is appropriate."
"To put this 5.3% imaging increase in context, it equates to more than one million imaging studies per year when applied to the roughly 20 million annual ED visits for the entire Medicare fee-for-service population," Christensen noted. "Although we focused on Medicare, there are approximately 130 million annual ED visits in the United States, so this figure could be substantially higher."
When the research team examined the specific imaging modalities, "We found that the presence of non-physician practitioners in the ED was associated with increases of 3.2% for radiography, 7.3% for CT, and 14.2% for other modalities (MRI and ultrasound)," stated co-author Richard Duszak, MD, professor and chair of the Department of Radiology at the University of Mississippi Medical Center. "Thus, the higher imaging associated with non-physician practitioners was most pronounced in these modalities in which we and others have observed rapidly increasing ED utilization."
The study noted that the share of ED visits managed by non-physician practitioners had steadily risen from 6.1% in 2005 to 16.6% in 2020.
"From an overall cost perspective, services rendered by non-physician practitioners have the potential to lower health care costs given that the Medicare Physician Fee Schedule pays for these services at 85% of what it pays physicians," stated co-author Timothy Swan, MD, Diagnostic and Interventional Radiologist, Marshfield Clinic Health System, Marshfield, WI.
"However, the increased imaging and other associated costs generated by these practitioners would offset these lower reimbursements. We did not address this cost question, but future research should explore the total cost impact of non-physician practitioners in the ED, considering both reimbursement and imaging orders."
Provided by Harvey L. Neiman Health Policy Institute
Citation: Non-physician practitioners in the ED associated with 5.3% more imaging use (2022, November 11) retrieved 9 December 2022 from https://medicalxpress.com/news/2022-11-non-physician-practitioners-ed-imaging.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.