The rise of medical device hacking: How strong is your network security?
Endroit courant :
> This Story

Ouverture ou Registre to rate this News Story
Forward Printable StoryPrint Comment




Health IT Homepage

Actively regulated EHR standards are driving demand for outsourcing critical functionality Staying ahead of the curve as SCRIPT17 deadline approaches

Patient record breaches in 2019 already double the total from last year Report finds almost 32 million patient record breaches, compared to 15 million in 2018

Kaiser Permanente team standardizes definition of complete imaging history Developed prompts to help in order entry process

Everyone’s part in the perfect EMR Tips for optimizing your facility's approach to patient data

Getting physicians to embrace telehealth By 2025 the U.S. telemedicine market is expected to exceed $64 billion

Browser beware: Study uncovers data leaks that could impact health IT Chrome and Firefox extensions may cause vulnerability

Carestream completes sale of IT business to Philips in most countries Now part of Philips in 26 of 38 countries where it operates

The building block(chain) of healthcare’s future? Insights from Eliot Siegel on what needs to happen for blockchain to improve the industry

Neurologica agrees to discounts for Strategic Radiology members Discounts on digital radiography and ultrasound, software and services

US leading digital health record adoption, but falls behind elsewhere: Philips report Country rates poorly in use of telemedicine and AI

The rise of medical device hacking: How strong is your network security?

By Jonathan Langer

In recent years, cyber threats have become increasingly sophisticated in terms of attack methods, the degree of damage inflicted, and their ability to circumvent existing security measures. While cyberattacks affect all sectors of business, of late, there has been a dramatic rise across the globe in attacks targeting healthcare and private patient data. In Q3 of 2018 alone, 4.4 million medical records were compromised, according to Protenus Breach Barometer.

IDC estimates that there will be 41.6 billion IoT devices in the field by 2025, with device data growing exponentially as well. By that time, data hackers will have a playground at their fingertips. Of those devices, 40% will be healthcare or medical devices. Due to the sensitive nature of their work, it’s incredibly important for hospitals and healthcare delivery organizations (HDOs) to ensure that any device connected to the network is secured and properly managed.
Story Continues Below Advertisement


Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.

Along with the rise of healthcare-related cyberattacks, comes an increased need for more sophisticated defense strategies. Simply implementing a general security solution will not suffice. Hospitals and HDOs need a complete solution that understands how both medical and non-medical devices are supposed to interact within a healthcare environment, as well as those that are susceptible to attacks.

Understanding the types of cyberattacks that target IoT devices
As the technology to prevent and detect cyberattacks becomes more advanced, so do the methods hackers use to get through to the devices with valuable personal information. The average cost of a breach was $3.86M in 2018, according to Ponemon. While there are many methods hackers leverage to attack IoT devices, there are some common attacks to be aware of in the medical field. For example, attacks aimed at obtaining personal medical information capitalize on the lack of multi-tiered defense of medical devices to extract such information. Alternatively, attackers target medical equipment as part of their attack vector to reach enterprise servers that house electronic medical records (EMRs).

Further, many attacks have the objective of disrupting medical treatment provided to patients, thereby posing a significant health risk. A large portion of contemporary medical treatments rely on data and measurements that originate from networked medical devices. Cyber attackers can exploit this dependence and tamper with the data and measurements, resulting in the administering of erroneous medical treatment (e.g., incorrect dosage of medication, misdiagnosis of diseases, etc.)
  Pages: 1 - 2 - 3 - 4 >>

Health IT Homepage

You Must Be Logged In To Post A Comment