AL Case Manager User Group

Therap Services welcomes all the users of Alabama to the upcoming AL Case Manager User Group that has been scheduled for 17th of July, 2020 at 1:00 PM (CDT). This informative session will be presented by accomplished members of our Therap team:

  • Maureen “Mo” O’Connell
  • Ishya “Shae” Dotson
  • Katy Lilly
  • Devin Hardy
  • Margaret Gordon

The user group will be  an incredible opportunity for Alabama providers to virtually meet other case managers from different agencies of the state to troubleshoot, network, discuss state and regional issues, and clarify and learn about the latest Therap releases. Throughout this session, our experts will walk you through the following topics:

  • The New IDF
  • Latest Release Notes
  • Overview of new or enhanced modules and Q&A

Therap has been offering the online suite of applications to the provider agencies of Alabama complying to the mandates formed by the Department of Mental Health Division of Developmental Disabilities, Division of Mental Health and Substance Abuse Services and Department of Mental Health Office of Autism Services. This collaboration with the state has been made with the objective to support providers who are serving individuals with intellectual and developmental disability (I/DD) .

Register now to secure your spot at the webinar!

Learn more about Alabama I/DD Providers, Alabama MH/SA, and Alabama Autism Providers.

Alert: Florida APD Billing Instruction for Life Skills Development Level 3

 

Florida Medicaid Health Care Alert
February 2015

Provider Type(s): 67Billing Instruction for Life Skills Development Level 3 (ADT) Services

 

Beginning March 1, 2015, Individual Budgeting (iBudget) providers of life skills development level 3 services (procedure codes S5102UC and T2021UC) must adhere to the following billing procedure:

 

  • Providers must submit claims for life skills development level 3 at the end of the month(or on the last day of the service period).
  • The claim must include the total actual hours of services provided.
  • The provider must round the total number of hours to the nearest hour. Providers should round only once at the end of the month (or the end of the billing period).

 

The Agency for Health Care Administration is committed to its mission of providing “Better Health Care for All Floridians.” The Agency administers Florida’s Medicaid program, licenses and regulates more than 45,000 health care facilities and 34 health maintenance organizations, and publishes health care data and statistics atwww.FloridaHealthFinder.gov.  Additional information about Agency initiatives is available via Facebook (AHCAFlorida), Twitter(@AHCA_FL) and YouTube (/AHCAFlorida).

 

Agency for Health Care Administration  |  2727 Mahan Drive, Tallahassee, FL 32308  |  http://ahca.myflorida.com


Apple iOS “Masque Attack” Technique

NCCIC / US-CERTNational Cyber Awareness System:

11/13/2014 09:17 AM EST
Original release date: November 13, 2014

Systems Affected

iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.

Overview

A technique labeled “Masque Attack” allows an attacker to substitute malware for a legitimate iOS app under a limited set of circumstances.

Description

Masque Attack was discovered and described by FireEye mobile security researchers.

[1] This attack works by luring users to install an app from a source other than the iOS App Store or their organizations’ provisioning system. In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link.

This technique takes advantage of a security weakness that allows an untrusted app—with the same “bundle identifier” as that of a legitimate app—to replace the legitimate app on an affected device, while keeping all of the user’s data. This vulnerability exists because iOS does not enforce matching certificates for apps with the same bundle identifier. Apple’s own iOS platform apps, such as Mobile Safari, are not vulnerable.

Impact

An app installed on an iOS device using this technique may:

  • Mimic the original app’s login interface to steal the victim’s login credentials.
  • Access sensitive data from local data caches.
  • Perform background monitoring of the user’s device.
  • Gain root privileges to the iOS device.
  • Be indistinguishable from a genuine app.

Solution

iOS users can protect themselves from Masque Attacks by following three steps:

  1. Don’t install apps from sources other than Apple’s official App Store or your own organization.
  2. Don’t click “Install” from a third-party pop-up when viewing a web page.
  3. When opening an app, if iOS shows an “Untrusted App Developer” alert, click on “Don’t Trust” and uninstall the app immediately.

Further details on Masque Attack and mitigation guidance can be found on FireEye’s blog [1]. US-CERT does not endorse or support any particular product or vendor.

References

Revision History

  • November 13, 2014: Initial Release
Go to Top