In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
If a borrower doesn’t pay their bill, then the collector buys these past-due payments from the business or creditor. They then try to collect what the person owes. To do this, they send debt collection letters.
Collecting from your clients doesn’t have to be an expensive, painstaking process. Sometimes, all that’s required is to send a solid debt collection letter. Here’s our step-by-step process on how to write an efficient one.