Steve Rebagliati, MD, MBA, cuts through the technobabble and gives you straightforward advice on the gear you need to succeed. This issue: Choosing a vendor.
Thousands of technology companies are vying for your dollars. Whether you are looking for an EMR, management software, or even just an operating system for your desktop computers, it can be amazingly difficult to figure out which vendor will give you the best product, best price, and best support.
I've worked with many of them, but I still can't say that each and every practice should buy this or that product from just this or that vendor.
Still, some basic ground rules can guide your vendor-selection process.
Here's the inside information on how to select a technology vendor from an expert in the field - Jay Abramovitz, president of Software Technology Group, a biomedical engineering and software development firm in Beaverton, Ore.
Abramovitz is himself a biomedical engineer by training and has consulted with healthcare information technology firms, helping them improve their product offerings for medical practices.
I asked him to share his views on the most common pitfalls to avoid in automating your medical practice.
Three rules
Abramovitz's rule of thumb, which he uses when buying technology for his own firm (and he buys a lot of it), is to avoid vendors who:
What about HIPAA?
Don't simply believe what a vendor's marketing department says about a product's HIPAA compliance because, says Abramovitz, "HIPAA means different things to different people." Does the HIPAA compliance feature you're being told about really work? Is it even necessary? It's hard to know at first glance.
Abramovitz's approach has been to independently verify a vendor's security claims. How?
"We hire a network security analyst to do a 'black hat/white hat' test," he told me. In such a test, the analyst runs a system first from a "white hat" perspective, verifying that a product has the security features described by the vendor. Then the analyst does a "black hat" test, with the permission of the client, on mock data to see if he can hack, degrade, corrupt, or otherwise compromise the security of the system. If a system survives this challenge, it's probably secure.
This kind of in-depth analysis generally is reserved for large firms able to spend $30,000 or more on a comprehensive audit. However, Abramovitz explained how small and medium-sized medical practices can conduct their own versions of black hat/white hat tests, at a reasonable cost. You can download this information for free by going to www.infotechfordoctors.com or in the "Tools" section of www.PhysiciansPractice.com. I'll summarize it for you in my next column.
This article originally appeared in the July/August 2005 issue of Physicians Practice.
Cybersecurity breach reports low during the pandemic
September 7th 2020A new report from CI Security suggests cybersecurity breaches were lower during healthcare's rapid transition to virtual care throughout the pandemic. In this episode of Perspectives, we look at why this might be and other aspects of their report with CI Security's Healthcare Executive Strategist, Drex DeFord.