Embeddedadvisor
US
APAC
EUROPE
  • Home
  • Insights
  • Whitepaper
  • Conferences
  • Newsletter
  • Subscribe
  • News
  • About us
Go to...
  • Home
  • Insights
  • Whitepaper
  • Conferences
  • Newsletter
  • Subscribe
  • News
  • About us
  • Categories

  • IP Design
  • Telecom
  • Wearables and Sensor
  • Consumer Electronics
  • IoT
  • Industrial Computing
Go to...
  • Categories

  • IP Design
  • Telecom
  • Wearables/Sensor
  • Consumer Electronics
  • IoT
  • Industrial Computing
×
#

Embedded Advisor Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Embedded Advisor

Subscribe

loading

THANK YOU FOR SUBSCRIBING

  • Home
  • News
Editor's Pick(1 - 4 of 8)
left
The Changing Role of CIO in the Biopharmaceutical Industry

Andy Newsom, CIO, CSL Behring

Automation Leading the Change in Healthcare

Rick Schooler, VP & CIO, Orlando Health

Keeping Up with the Latest Medical Trends

Joseph G Seay, Former SVP & CIO, Community Health Systems

Making Healthcare Better Through Mobile Innovation

Bijoy Sagar, Global CIO, Stryker

Innovations that Enhance Public Healthcare

John Kravitz, CIO, Geisinger

Making Digital Health a Primary rather than an Additive Solution

Jennifer Briley Christian, Vice President, Clinical Evidence, IQVIA [NYSE: IQV]

Recent Trend and Development in Pharmaceutical Industry

Richard Hu, Associate Director CMC, Curis, Inc. [NASDAQ: CRIS]

Strong Business- HR Partnerships, Coupled With Technology, Help Drive Talent Agenda

Cindy Carlisle, VP, HR. Commercial Operations, Roche Diagnostics Corporation

right

Managing Security Vulnerabilities in Connected Medical Devices

By Embedded Advisor | Thursday, January 31, 2019

Tweet

Connected medical devices are evolving as the lifeblood of healthcare infrastructure. Some of these systems are running with significant security vulnerabilities that can greatly impact the functioning of the healthcare system. So the challenge of securing these devices is becoming increasingly important to health systems around the world. Below are certain recommended best practices for safeguarding those sensitive devices.

1. Establishing and maintaining communication with medical device manufacturer's security professionals to ensure that the devices have the latest measures in form of patches and ensured communication about threats. 

Few Medical Devices Design & Solution Companies: DFI ITOX,Flexible Circuit Technologies,

2. Installing security and updated system patches on devices can also help. The coded patches should be validated, distributed by medical device manufacturers and properly tested before implementation.

3. Assessing current security controls on networked medical devices can ensure efficient working and will not be easily hacked.

4. Assessing inventory traits should include a Media Access Control address, Internet Protocol address, network segments, operating systems, applications and other elements relevant to managing information security risks.

5. Implementing pre-procurement security requirements can help ensure the organization's minimum requirement for the device and network security is achieved.

6. Implementing information security assuring practices, such as security risk assessment of new devices, validation of vendor practices on both networks and facilities.

7. Implementing access control for clinical and vendor support staff. The process can include remote access, monitoring of vendor access and so on.

8. Developing and implementing network security applications and practices for device networks.

9. Allocating the right resources to support the operating costs to keep the connected medical devices safeguarded. It is important to do this cost analysis upfront to determine the cost-effectiveness of the security program, to identify a trusted partner and exploring advanced solutions.

Check This Out: Top Medical Devices Design Companies

As more network-connected medical devices continue to enter the healthcare IT infrastructure, security practices need to be in place. A strong urge for enforcing these practices can help fix the fast-growing issue to contribute in the long run of the organization.

tag

inventory

Read Also

How Embedded Tech is Transforming Medical Device Making

How Embedded Tech is Transforming Medical...

Medical Device PCB Development: 3 Key Considerations to Note

Medical Device PCB Development: 3 Key...

3 AR Driven Innovations in the Medical Industry

3 AR Driven Innovations in the Medical Industry

3 Embedded System Applications Influencing Medical Equipments

3 Embedded System Applications Influencing...

Weekly Brief

loading

New Edition

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 Embedded Advisor. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy.
follow on linkedin follow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

www.embeddedadvisor.com/news/managing-security-vulnerabilities-in-connected-medical-devices-nid-288.html