How Healthy is your Firewall?

I am going to date myself: My first pharmacy job, back when I was a pharmacy student in the mid 1980’s, still used a typewriter to create labels. There were computerized pharmacy systems available, but they were not ubiquitous as they are today. Comparing workflow technologies at my first pharmacy job to what I do today is a very, very stark contrast.

Technologies have made the practice of pharmacy much more robust over the years. First came electronic patent records and electronic claim submission. Then robust clinical screening tools, electronic point of sale registers, and IVR technologies. Today, we use advanced robotics and networking, allowing me to manage my stores that might be more than 2 hours away by car.

Along the way, pharmacy, and especially independent community pharmacies, have become targets on the digital front. Pharmacies collect significant amounts of personal information that are useful to identity thieves, as well as process a lot of credit card transactions. And unlike the larger chains, who have technology budgets to address these threats, smaller independent pharmacies are often not aware or prepared to thwart these threats.

Today, even large companies regularly suffer data breaches. I received two notices in the last 6 month related to my information possibly being involved in breaches with larger companies. We generally don’t hear about the smaller companies being breached, but it does happen, and the consequences are just as troublesome for both the pharmacy and their patients.

Information Technology Security is a big deal today, and generally speaking, it is beyond the expertise of most small pharmacy owners. Even if an owner is technically savvy, they probably don’t have the time to handle it AND manage the other daily aspects of operating a pharmacy. You need help. Expert help.

This can be expensive. Our company underwent a security audit awhile back. This was a real expense, but the money was well spent. While our physician and technical security was well reviewed (and we were able to shore up some small deficiencies quickly), we discovered that we lacked specific policies and procedures. Knowing your technological weaknesses, in today’s world, is important.

Security thru obscurity is not an option. If you have not invested in your network security, you are at risk. Even if you have made the investment, having a third-party validate your work is important. Like everything worth doing, Make Every Encounter Count, including those involved around your businesses security. And as always, if you have questions or need additional guidance, let us know!

Published by

Michael Deninger

Mike graduated from the University of Iowa with a BS in Pharmacy in 1991 and completed his Ph.D. in 1998. He has over 20 years of practice experience, over half of which is as a pharmacy owner. Areas of expertise also include technology in practice, including integration with data sources.

Discover more from The Thriving Pharmacist

Subscribe now to keep reading and get access to the full archive.

Continue reading