Internet-Connected Medical Devices and Cybersecurity Risk | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


By: Ebonee Hunter-Goldsby, Sr. Manager, Customer Service, Apricus, an Enlyte Company

The advent of the Internet of Medical Things (IoMT) has facilitated the transmission of data from medical devices and enabled physicians to remotely customize treatment settings. However, like other computer systems, medical devices are susceptible to security breaches, which have the potential to compromise the device’s safety and effectiveness.

The health care sector is a prime target for cyberattacks, with hospitals accounting for 30% of major data breaches. Frequently, medical devices stay in operation despite outdated serviceability, potentially exposing vulnerabilities that attackers can exploit.

A security company report identified nurse call systems, infusion pumps and medication dispensing technologies as the most high-risk medical devices with internet connectivity. This conclusion was drawn based on an analysis of common vulnerabilities and exposures (CVEs). The assessment conducted by the security company revealed that 39% of nurse call systems and 27% of infusion pumps have unpatched critical CVEs.

Unfortunately, numerous medical devices are exposed to cybersecurity risks because of outdated software, insufficient encryption and weak password security. These vulnerabilities can be exploited by cybercriminals to compromise patient data, enabling them to engage in activities such as identity theft, fraud and other malicious acts. 

After years of concerns regarding the vulnerability of an increasing number of internet-connected medical devices used in hospitals and health care facilities to hacking and ransomware attacks, the Food and Drug Administration (FDA) has implemented new recommendations. The document offers guidance on ensuring medical devices align with cybersecurity standards to reduce potential risks.

According to the updated guidance, all prospective manufacturer applicants for new medical devices are now required to present a comprehensive strategy outlining how they intend to monitor, detect and resolve cybersecurity concerns. Additionally, they must establish a systematic approach that ensures a reasonable level of protection for the device under consideration. Manufacturers will be responsible for regularly releasing updates and patches, both as part of predetermined schedule and during critical circumstances. Furthermore, they are obligated to furnish the FDA with a software bill of materials, encompassing any open-source or other software utilized in their devices.

Maintaining the health of medical devices and safeguarding personal information is not solely the responsibility of device manufacturers and health care providers. Patients and caregivers also have a vital role to play in this regard. The FDA provides the following tips to consider:

  • Adopt good password practices.
  • Maintain physical control over the device.
  • Only establish connections between other devices/software if both device manufacturer and health care provider approve.
  • Regularly update the device to ensure optimal protection.
  • Consult the device manufacturer or health care provider to acquire specific best practices.

As the utilization of wireless, internet-connected devices, portable media and the regular electronic sharing of medical device information continues to rise, the significance of proficient cybersecurity will continue to grow, emphasizing the necessity to safeguard device functionality and safety.

About the Author

Ebonee Hunter-Goldsby plays a vital role in overseeing successful projects, migrations and system developments as a program and process implementation and improvement leader. With over 12 years of experience in the workers’ comp industry, she leads a diverse team of experts, including trainers, data management specialists, financial, quality and business analysts, all dedicated to delivering exceptional service. 

Ebonee is also a regular contributor to our Specialty Solutions Spotlight where this article originally appeared. To ask and find the answers to more work comp specialty questions, visit our website and subscribe to our monthly series.



Click Here For The Original Source.

National Cyber Security