+ All Categories
Home > Documents > Flip the script and adopt a “defense is the best offense ... · security – it’s essential...

Flip the script and adopt a “defense is the best offense ... · security – it’s essential...

Date post: 27-Sep-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
1
Reshaping the Medical Device Industry through Cybersecurity Healthcare organizations increasingly find themselves victims of a cyber attack. Whether it be a breach in patient data or asset destructions, unsecure medical devices continue to put hospitals and patients at risk. Flip the script and adopt a “defense is the best offense” mentality to combat the unseen dangers of today. Considerations for healthcare providers Foster a culture that prioritizes security – it’s essential that all users are trained and aware of all possible security risks Meet hackers’ level of sophistication – update your technology to combat cyber attacks Work with a trusted partner – align security measures across your organization with solutions providers who commit themselves to producing reliable equipment SOURCES: http://hitconsultant.net/2016/01/28/hackers-caused-98-of-healthcare-data-breaches/; https://www2.idexpertscorp.com/knowledge-center/single/third-annual-benchmark-study- on-patient-privacy-data-security; http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html; http://www.eweek.com/it-management/slideshows/security-concerns-cloud-adoption-top-of-mind-for-health-care-it-pros.html?utm_medium=email&utm_campaign=EWK_NL_STE_20160531 _STR1L1&dni=328966941&rni=32894901; http://www.foxnews.com/tech/2016/02/16/hollywood-hospital-hit-by-ransomware-attack-hackers-demand-3-6m.html; http://www.himss.org/hitsecurity 98 % of healthcare data breaches were caused by hackers in 2015 90 % of healthcare organizations reported experiencing a data breach in the 24 month period from April 2014 - April 2016 69 % of healthcare professionals indicated that the most significant cybersecurity threat in the future is ransomware 59 % of healthcare decision makers believe security and data privacy is the most challenging aspect when using connected devices The Internet can be a valuable medium to gain knowledge and connect globally, but it can also facilitate unwanted attacks from hackers As regulations continue to adjust with growing technology, so, too, must hospitals. The FDA’s final guidance on medical cybersecurity was released December 2016, stating the agency’s expectations for monitoring, identifying and addressing cybersecurity vulnerabilities in medical devices FOREIGN & DOMESTIC ATTACKS CHANGING REGULATIONS Outdated medical devices are sitting ducks. Be sure to invest in solutions that are designed to enhance security for your stakeholders OUTDATED EQUIPMENT For instances with Internet of Things (IoT) devices, hackers’ automated scanning processes can identify Internet-connected devices and leverage default passwords to attack the device or gather confidential information BETTER HACKING TECHNOLOGY As technology continues to evolve, so do the avenues of risk and resources available to hackers. Be sure to keep an eye on: 91 03 647
Transcript
Page 1: Flip the script and adopt a “defense is the best offense ... · security – it’s essential that all users are trained and aware of all possible security risks Meet hackers’

Reshaping the Medical Device Industry through CybersecurityHealthcare organizations increasingly find themselves victims of a cyber attack. Whether it be a breach in patient data or asset destructions, unsecure medical devices continue to put hospitals and patients at risk.

Flip the script and adopt a “defense is the best offense” mentality to combat the unseen dangers of today.

Considerations for healthcare providers

Foster a culture that prioritizes security – it’s essential that all users are trained and aware of all possible security risks

Meet hackers’ level of sophistication – update your technology to combat cyber attacks

Work with a trusted partner – align security measures across your organization with solutions providers who commit themselves to producing reliable equipment

SO

UR

CE

S: h

ttp:/

/hitc

onsu

ltant

.net

/201

6/01

/28/

hack

ers-

caus

ed-9

8-of

-hea

lthca

re-d

ata-

brea

ches

/; h

ttps:

//w

ww

2.id

expe

rtsc

orp.

com

/kno

wle

dge-

cent

er/s

ingl

e/th

ird-a

nnua

l-ben

chm

ark-

stud

y-on

-pat

ient

-priv

acy-

data

-sec

urity

;ht

tp:/

/ww

w.la

times

.com

/bus

ines

s/te

chno

logy

/la-

me-

ln-h

olly

woo

d-ho

spita

l-bitc

oin-

2016

0217

-sto

ry.h

tml;

http

://w

ww

.ew

eek.

com

/it-m

anag

emen

t/sl

ides

how

s/se

curit

y-co

ncer

ns-c

loud

-ado

ptio

n-to

p-of

-min

d-fo

r-he

alth

-car

e-it-

pros

.htm

l?ut

m_m

ediu

m=e

mai

l&ut

m_c

ampa

ign=

EW

K_N

L_S

TE_2

0160

531

_STR

1L1&

dni=

3289

6694

1&rn

i=32

8949

01; h

ttp:/

/ww

w.fo

xnew

s.co

m/t

ech/

2016

/02/

16/h

olly

woo

d-ho

spita

l-hit-

by-r

anso

mw

are-

atta

ck-h

acke

rs-d

eman

d-3-

6m.h

tml;

http

://w

ww

.him

ss.o

rg/h

itsec

urity

98%of healthcare data breaches were caused by hackers in 2015

90%of healthcare organizations reported experiencing a data breach in the 24 month period from April 2014 - April 2016

69%of healthcare professionals indicated that the most significant cybersecurity threat in the future is ransomware

59%of healthcare decision makers believe security and data privacy is the most challenging aspect when using connected devices

The Internet can be a valuable medium to gain knowledge and connect globally, but it can also facilitate unwanted attacks from hackers

As regulations continue to adjust with growing technology, so, too, must hospitals. The FDA’s final guidance on medical cybersecurity was released December 2016, stating the agency’s expectations for monitoring, identifying and addressing cybersecurity vulnerabilities in medical devices

FOREIGN & DOMESTIC ATTACKS

CHANGING REGULATIONS

Outdated medical devices are sitting ducks. Be sure to invest in solutions that are designed to enhance security for your stakeholders

OUTDATED EQUIPMENT

For instances with Internet of Things (IoT) devices, hackers’ automated scanning processes can identify Internet-connected devices and leverage default passwords to attack the device or gather confidential information

BETTER HACKING TECHNOLOGY

As technology continues to evolve, so do the avenues of risk and resources available to hackers.

Be sure to keep an eye on:

91 03 647

Recommended