Fundamentally, the quality and availability of healthcare services depend upon technology. Therefore, the effective use, security, and resiliency of a health information technology system are mission-critical functions.
Technology Evaluation, Contracting, & Implementation
While technology is integral to health services and operations, there is a profound language gap between clinicians, healthcare and human services management, and technology developers. Atrómitos fills that gap. We serve as a translator between two highly technical industries, defining issues and presenting solutions.
Our Technology Evaluation, Contracting, & Implementation Services Include:
- Evaluating operational needs to define system requirements.
- Drafting RFIs and RFPs to identify vendors that meet system requirements.
- Evaluating technology platforms against system requirements, usability, and compliance requirements.
- Cybersecurity and privacy compliance evaluations.
- Contract negotiations, including Service Level Agreements, payment milestones, charter drafting, and data storage protocols.
- Oversight of the development of customized instances in compliance with Project Charters, contract terms, and project milestones.
- Leading implementation of platforms in clinical and administrative settings.
Market Viability Assessment
Having a solution to a problem in our health ecosystem isn’t enough. The healthcare market must also be prepared to adopt and pay for the solution.
Our Market Viability Assessment Services Include:
- Help to understand and navigate the healthcare and social services markets they seek to participate in.
- Advising on industry regulations and market trends so that partners target the correct “buyer” and offer a product tailored to that buyer’s needs and requirements.
- Product and operational development, refinement, and implementation, thereby helping technology companies overcome the operational, payment, cultural, and regulatory language gaps that exist.
Security & Privacy
In delivering security services, our approach is to provide concrete, actionable guidance to simplify the complexity of cybersecurity and privacy practices and threats. An organization must be able to adapt rapidly. This level of agility requires an organization to move from cybersecurity awareness and defensive reaction to cultivating cybersecurity resilience.
Resilience is critical because being “offline” or unable to perform basic functions for patients, providers, or a population is not an option. Atrómitos leverages partnerships with strategic partners to provide granular technical expertise. We utilize the MITRE ATT&CK and Engage Frameworks to establish a common cybersecurity “literacy” and vocabulary within and across an organization.
Our Security & Privacy Services Include:
- Conducting organizational or programmatic risk assessments.
- Advising on industry trends in cybersecurity, the implementation of tailored best practices, and its impact on an organization’s risk posture.
- Conducting threat modeling based on an organization’s operations and structure to inform strategy and decision-making.
- Providing due diligence evaluation of information security system risks of potential or pending acquisitions.
- Developing and conducting tailored employee cybersecurity training.
- Developing, evaluating, and updating organizational Information Security and Data Management Policies and Procedures to reflect best practices, operational workflows, and identified vulnerabilities and threats; and
- Evaluating organizational application program interfaces (APIs) and data exchange protocols to ensure compliance with the 21st Century CURES Act regulations, while integrating security controls and practices.
Read Our Ideas About Digital Strategy
-
5 Tips to Protect Your Privacy Online
For this week’s segment of Our Ideas, Principal Tina Simpson brings us five ways to protect your data and privacy on your adventures scouring the internet. To recap the importance of…
·
-
Reflections on Digital Security Awareness: Why Availability is Not the Same Thing as Accessibility
While October has now passed, recognizing the threat of cyber-attacks is closer to the front of mind for business leaders across industries. There is also no shortage of activity among…
·
-
Proper Cybersecurity Practices Amid Big Data & Privacy Breaches
Between Peiter Zatko’s testimony before Congress regarding Twitter’s privacy and security operations earlier this month and Uber’s data breach last week, the last few weeks have been eventful when it…
·
-
A Case Study in Security by Design & the Cost of Failure
Two weeks ago, the Washington Post broke a story on the former Twitter Executive and head of security, Peiter Zatko, blowing the whistle on Twitter’s privacy and security practices.
·
-
Understanding Cybersecurity and Sutton’s Law: Where the Money Is
There is no shortage of reasons why it is imperative for healthcare providers to improve their cybersecurity insurance. But, recently, doing so has become harder and more costly. Principal Tina…
·
-
Thinking about Technology in Health Care – The Gap Between Use-Case and Usability
Lack of EHR usability is related to patient safety and quality concerns as well as provider burnout. Tina Simpson discusses the importance of integrating user centered design principles as it…
·