Digital transformation in healthcare is an incredible tool that is actively working to make the lives of patients and staff better every day; especially as more organizations begin to embrace it and expand its use throughout their healthcare systems. However, as with every new idea and technology, we must immediately think of the potential security vulnerabilities and how to cover them. With digital transformation, two big areas we need to consider the security risks of are connected medical devices and the Internet of Things (IoT).
So, as healthcare embraces digital transformation, what considerations and safeguards are in place to address potential vulnerabilities in connected medical devices and IoT within the healthcare ecosystem? We reached out to our insightful Healthcare IT Today Community with this question and the following is what they had to share.
Yigal Rozenberg, SVP Technology at Protegrity
As healthcare embraces digital transformation, ensuring the security of connected medical devices and IoT systems requires ongoing collaboration between healthcare providers, manufacturers, IT security teams, and regulatory bodies. Key safeguards include maintaining an inventory of connected devices, segmenting networks, implementing security by design, conducting regular vulnerability assessments, and enforcing strong access controls. Additionally, continuous monitoring, patch management, risk assessments, vendor management, regulatory compliance, incident response planning, and user training are crucial. Balancing the benefits of connected devices with robust security measures remains a primary challenge in the evolving threat landscape.
Marlena Herrera, Director of Customer Success at Protegrity
In the Healthcare industry sensitive data is commonly thought of as Personally Identifiable Information [PII]. Considering medical devices and IoT, we have to look at what may be sensitive differently. Thinking about information such as location, IP address, medical device number, and other components that are not usually thought of as sensitive must be considered with the increased number of connected devices within the healthcare ecosystem. Having a solution that resolves data challenges for PII, medical devices, and IoT-connected devices improves the security posture and safeguards the healthcare ecosystem’s data.
Yuval Wollman, Chief Cyber Officer at UST
As healthcare organizations adopt digital transformation, addressing vulnerabilities in connected medical devices and IoT is significant. Healthcare organizations should make sure that “security by design,” where security is integrated into the development of these devices, is part of the product development. In addition, regular software updates and patching can help maintain the latest security protections. In the Change Healthcare attack, outdated systems were exploited and contributed to the shutdown of systems.
A network segmentation strategy should also be in place as it limits the spread of attacks by separating critical medical devices and their connected networks from other networked systems. As always, and as part of cyber hygiene, continuous monitoring and leveraging threat intelligence for real-time threat detection are also essential to maintain the integrity and safety of an organization’s network.
Pratik Maroo, Head of Healthcare and Life Sciences at Zensar
It is estimated that the value of medical IoT devices will be $467.25 billion by 2027. The pandemic accelerated the adoption of emerging regulations to expedite the use of IoT in the medical world. Some of the measures are to: Enforce strong password policies and regularly update their secure network services and interfaces by up-to-date encryption, authentication, and authorization measures Establish secure firmware updates with automatic, authenticated, and encrypted update mechanisms Regularly review and update components used in the IoT/connected devices Data minimization practices to collect required information Comprehensive device management policies with regular security audits Physical security measures to prevent from tampering/unauthorized access.
Jerry Mancini, Senior Director, Office of the CTO at NETSCOUT
It’s crucial to address vulnerabilities in IoT-connected medical devices. Key considerations include implementing strong security measures for these devices, such as regular software updates and robust authentication protocols. This is important because IoT devices are often hijacked to join botnets that can launch large-scale DDoS attacks capable of crippling networks and mission-critical applications. Additionally, ensuring that devices are segmented from critical systems and monitored for unusual activity can help mitigate these risks and protect patient data. Concerns related to security risks and the IT organization’s ability to respond to them are significant, particularly in hospitals. The extensive cache of distributed IoT devices poses a unique challenge, with threats against these devices being of particular concern.
To address this, network visibility into all IT activity, including IoT is crucial. Network Operations (NetOps) and Security Operations (SecOps) teams must work together to reduce threats and investigate potential incidents of compromise. By collaborating effectively, these teams can enhance the security posture of healthcare organizations, ensuring that connected medical devices and IoT systems are safeguarded against vulnerabilities, thus protecting patient data and maintaining the integrity of healthcare services.
William Ogle, Senior Director of Governance, Risk, and Compliance at Nordic Consulting
As healthcare embraces digital transformation, addressing potential vulnerabilities in connected medical devices and the Internet of Things (IoT) is crucial. Organizations and manufacturers are implementing several key safeguards to enhance security, including adherence to industry standards and regulatory requirements, robust authentication and access control measures, and end-to-end encryption of data at-rest and in-transit. Regular security assessments, timely patching, and software updates are vital to mitigate risks. Network segmentation and continuous monitoring help isolate and detect threats, while comprehensive incident response and disaster recovery plans ensure swift action during breaches.
To safeguard the entire ecosystem, third-party risk management and supply chain security are essential controls. Within healthcare organizations, ongoing user education and cybersecurity training programs can help foster a culture of security awareness. Through these measures, healthcare organizations can better protect their IoT devices and more importantly, strengthen their overall information security and privacy programs.
Marcus Flack, CTO/Chief Technology Officer at CenTrak
As healthcare systems increasingly incorporate digital technologies and IoT devices, addressing potential vulnerabilities involves a purposeful process from the beginning. Healthcare decision-makers must lay a strong foundation and ensure that security measures are integrated into the design and implementation of connected devices and systems. To better ensure the proper foundation, healthcare teams must evaluate the security posture of vendors providing connected devices to ensure they meet stringent security requirements. Our cloud software hosted on AWS comes to mind for me.
However, the job isn’t over once the implementation is completed. We always recommend teams perform regular penetration tests to identify and address any potential vulnerabilities in IoT devices as well as implement continuous monitoring to detect and respond to threats in real time. To further safeguard, organizations should employ strong encryption and access controls to protect patient data transmitted and stored by IoT devices, along with adhering to industry standards and regulations to ensure that connected devices meet necessary security requirements.
Charles Cinert, Chief Services Officer & General Manager at ClearDATA
Wearables and IoT devices are undeniably a marvel of modern healthcare technology, continually evolving and offering unprecedented convenience and health monitoring capabilities that can improve patient health outcomes. That said, wearables contain and transmit significant amounts of protected valuable health information. One major challenge is the lack of standardized security protocols across various manufacturers of wearable devices. With no uniform baseline for security measures, wearables become an increasingly attractive target for exploitation. Given the diverse range of devices—from heart rate monitors to glucose sensors—any compromise can lead to data manipulation. Such tampering could result in incorrect diagnoses or treatment decisions, directly impacting patient health and safety.
The potential for ransomware attacks on connected devices adds another layer of concern. As these devices often handle critical health monitoring and management functions, any disruption could have severe consequences on patient care. The risk is further compounded by the possibility of these devices opening up multiple entry points for sophisticated threat actors to infiltrate larger healthcare-connected networks. This underscores the need for device manufacturers and healthcare organizations to implement comprehensive cybersecurity and compliance measures.
Establishing stringent, industry-wide security standards would mitigate these risks, but in the absence of standardized measures, it is critical that wearable device companies prevent unauthorized access. This includes following strong encryption standards, deploying regular software updates, ensuring multi-factor authentication, and implementing proactive and continuous threat monitoring and detection. It also means regularly testing and reviewing their devices against HIPAA, GDPR, NIST, and other healthcare security, privacy, and compliance frameworks. The combined efforts of strong technical measures, continuous vigilance, and industry collaboration are essential to safeguarding the future of wearable technology.
Mike Donahue, Chief Delivery Officer at CloudWave
To address potential vulnerabilities in connected medical devices and the Internet of Things within the healthcare ecosystem, healthcare organizations should go beyond their IT Incident Response plan and consider adopting a medical device cybersecurity approach that prioritizes patients.
This includes implementing a program designed to bring together technology and processes for a single focus of protecting the patient in the event of a cyberattack. It should enable all levels of the healthcare organization to understand the security risks involved with medical devices, define policies, deploy breach detection, perform medical-device manufacturer cybersecurity risk assessments, and more.
Additionally, healthcare organizations should proactively develop incident response plans that take into account the potential impact of cyberattacks on connected medical devices and IoT and ensure that clinical staff have defined actions to take in the event of a cyberattack.
Cecil Pineda, Senior Vice President and Chief Information Security Officer at R1
IoTs may be one of the hardest areas to protect, as many of these devices do not utilize common operating systems, protocols, or standards. They may have embedded credentials or default credentials, with some of these devices insecure out of the box. There are many technologies out there to help protect them, but what I have found to be more effective is segmenting them off your network, protecting access to these devices and networks, and applying some intrusion detection capabilities so you can monitor any intrusions. Systems hardening and firmware maintenance are key, even if it’s limited.
There are so many good points to consider here! Huge thank you to Yigal Rozenberg, SVP Technology at Protegrity, Marlena Herrera, Director of Customer Success at Protegrity, Yuval Wollman, Chief Cyber Officer at UST, Pratik Maroo, Head of Healthcare and Life Sciences at Zensar, Jerry Mancini, Senior Director, Office of the CTO at NETSCOUT, William Ogle, Senior Director of Governance, Risk, and Compliance at Nordic Consulting, Marcus Flack, CTO/Chief Technology Officer at CenTrak, Charles Cinert, Chief Services Officer & General Manager at ClearDATA, Mike Donahue, Chief Delivery Officer at CloudWave, and Cecil Pineda, Senior Vice President and Chief Information Security Officer at R1 for taking the time out of your day to submit a quote! And thank you to all of you for taking the time out of your day to read this article! We could not do this without all of your support.
As healthcare embraces digital transformation, what considerations and safeguards do you think are in place to address potential vulnerabilities in connected medical devices and the Internet of Things (IoT) within the healthcare ecosystem? Let us know either in the comments down below or over on social media. We’d love to hear from all of you!