Pros & Cons of Outsourcing Revenue Cycle Functions: What You Need to Consider
01/26/2026 Recorded WebinarDescription
Many providers have considered outsourcing functions in the revenue cycle.
Like all businesses, some third-party companies do excellent work for providers, but there may be others that look for ways to take advantage of their provider. Outsourcing has its own pros & cons that must be carefully considered. We will review major common areas that providers must weigh strategically before making a decision whether to outsource and selecting the best partner for your needs.
It is vital providers know exactly who is handling their claims and what they are doing with their information.
- Definitions of third-party vendors
- Legal responsibilities of the provider
- Common industry trends
- Important questions to ask vendors & contractors
Who Will Benefit
- Physicians
- Practice managers
- Medical assistants
- Nurses
- Compliance staff
- Billers
- Coders
- Revenue Cycle
- Risk Management
- Mid level providers
Webinar Details
-
Recorded Webinar
Speaker:
Dorothy D. Steed
MSLD, CCS, CDIP, COC, CPCO, CPUM, CPUR, CPHM, CPMA, ACS-OP, CCS-P, RCC, RMC, CEMC, CPC-I, CFPC, PCS, FCS, CRCR, CICA, CPAR
Dorothy Steed is an Independent Healthcare Consultant and Educator. She has served as Medicare specialist and a physician audit supervisor...
Related Events
Chargemaster: A Critical Tool For Revenue Cycle Ma...
A hospital chargemaster is a comprehensive list of a hospital's products, procedures, and services. ..
Revenue Trifecta: Coding, Billing, Documentation
Many providers have seen a significant increase in claims delays and outright denials. The reasons m..
Paying for Referrals: A Danger to Your Freedom + B...
Paying for Referrals: A Danger to Your Freedom The session will provide an overview of the Anti-K..
Upcoming Webinars
HIPAA in 2026: What Changed, What’s Coming, and Wh...
Over the last few years, the U.S. Department of Health and Human Services, Office for Civil Rights h..
HIPAA Breach Risk Assessment for Ransomware Attack...
HIPAA Breach Risk Assessments determine whether a Ransomware attack constitutes a HIPAA Breach that ..
E&M Coding Guidelines and Documentation Requir...
During this presentation we will Review current documentation guidelines for different location that..






