The key to connected care excellence

Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security solutions architect in the cyber security industry.
By connecting medical devices, sensors, and other equipment to the internet, hospitals can improve patient care, reduce costs, and improve efficiency.
Despite the increasingly complex nature of IoT environments, IT security solutions have lagged behind, offering limited visibility and control over IoT devices and the associated risks they present.
Securing these devices poses a challenge due to the vast range of communication protocols they employ and their inherent vulnerabilities stemming from legacy operating systems, hardcoded or weak passwords, patching difficulties, physical accessibility, operating system misconfigurations, lack of built-in security measures, and unsecured communication protocols.
Simply upgrading OEM devices running Windows 7 is undoable due to high costs.
Same goes for Embedded XP. Examples of such devices are imaging systems, magnetic resonance imaging and computed tomography, blood pressure monitoring devices and defibrillators.
Rough estimations are that 70% of all medical devices are unsupported.
Certification is essential to ensure that medical IoT devices meet the necessary regulatory standards and comply with healthcare industry requirements.
It helps guarantee that these devices are accurately designed, built with appropriate quality controls and have reliable performance.
Devices must undergo assessment to ensure they have appropriate measures in place to safeguard data privacy, prevent unauthorized access, and maintain data integrity.
Certification may require devices to demonstrate compatibility with relevant communication protocols and healthcare information systems.
A huge game changer is that with every change in a program, firmware or patch a IoMT device might face the need to be re-certified again.
Yet those devices plays a critical role in ensuring the reliability, safety and effectiveness of connected healthcare devices, protecting patient well-being and fostering innovation in the healthcare industry.
Additional challenges arise from the fact that a significant number of SCADA devices still operate using default or easily guessable passwords.
The intersection of 5G and IoT for revolutionized healthcare.
Properly securing IoT devices is crucial for various reasons and particularly so in the case of medical and health records.
These malicious activities can compromise the sensitive health data stored in IoT devices, causing disruptions and potential harm to patients.
Organizations that fail to secure their IoT devices may face significant financial implications resulting from data breaches, litigation fees, and regulatory penalties.
Reputational damage is a major consequence of insecure IoT devices in healthcare.
By securing IoT devices, healthcare organizations adhere to industry standards and reduce the risk of legal complications, ensuring compliance with privacy laws and regulations.


This Cyber News was published on blog.checkpoint.com. Publication date: Fri, 05 Jan 2024 13:43:04 +0000


Cyber News related to The key to connected care excellence

Prestige Care Announces Data Breach Affecting an Unknown Number of Residents and Employees - On November 6, 2023, Prestige Care Inc. filed a notice of data breach with the U.S. Department of Health and Human Services Office for Civil Rights after discovering that an unauthorized party accessed the company's computer network. In this notice, ...
11 months ago Jdsupra.com
2024 Cybersecurity Excellence Awards - Great news: By popular demand, we extended the deadline for the 2024 CYBERSECURITY EXCELLENCE AWARDS until April 27,2024. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That's where the Cybersecurity Excellence ...
6 months ago Cybersecurity-insiders.com
Three Trends to Watch in 2024 - Our new guide, The Healthcare CISO's Guide to Cybersecurity Transformation, highlights the latest trends in healthcare today and where security leaders should focus their defensive efforts going forward. Malicious attacks on healthcare have grown ...
9 months ago Paloaltonetworks.com
Tri-City Medical Center in Oceanside hit by cybersecurity attack - Tri-City Medical Center is diverting ambulance traffic to other hospitals Thursday as it copes with a cybersecurity attack that has forced it to declare "An internal disaster" as workers scramble to contain the damage and protect patient records. The ...
11 months ago Sandiegouniontribune.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
Cyberattack on health services provider impacts 5 Canadian hospitals - A cyberattack on shared service provider TransForm has impacted operations in five hospitals in Ontario, Canada, impacting patient care and causing appointments to be rescheduled. TransForm is a not-for-profit, shared service organization founded by ...
11 months ago Bleepingcomputer.com
Product showcase: Protect digital identities with Swissbit's iShield Key Pro - In today's fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. ...
4 months ago Helpnetsecurity.com
Future Health: AI's Impact on Personalised Care in 2024 - As we dive into the era of incorporating Artificial Intelligence into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised ...
10 months ago Cysecurity.news
Behind EB Control's Revolutionary Patented Key Management System - If you're knee-deep in the world of data security, you'd agree that the key to unlocking superior protection lies, quite literally, in the keys- the encryption keys, to be precise. When it comes to managing these critical elements to safeguard your ...
11 months ago Securityboulevard.com
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
1 month ago Securelist.com
Capital Health Hospitals hit by cyberattack causing IT outages - Capital Health hospitals and physician offices across New Jersey are experiencing IT outages after a cyberattack hit the non-profit organization's network earlier this week. The healthcare system manages two hospitals, an outpatient facility in ...
11 months ago Bleepingcomputer.com
Driving into Tomorrow: The AI powered Car Takeover - In the next decade, a tech-driven revolution is set to transform our roads as 95% of vehicles become AI-powered connected cars. These smart vehicles, while promising enhanced safety and convenience, come with a catch-each generating a whopping 25 ...
9 months ago Cysecurity.news
Bitwarden: how to create and use Passkeys to sign in - They can use a master password and improve security by adding a two-factor authentication option to the process. A private part of it never leaves the device, which means that all standard password attacks don't work against passkeys. I used the ...
9 months ago Ghacks.net
How GPL-1 Drug Success Transforms Healthcare Revenue - The huge revenue opportunity stemming from recent success of GLP-1 drugs is not just for the pharmaceutical companies. The new category of Diabetes, weight loss and obesity drugs called GLP-1s is predicted to be a game-changing innovation in ...
9 months ago Feedpress.me
Change Healthcare's New Ransomware Nightmare Goes From Bad to Worse - Change Healthcare is facing a new cybersecurity nightmare after a ransomware group began selling what it claims is Americans' sensitive medical and financial records stolen from the health care giant. RansomHub claimed it had health care data on ...
6 months ago Wired.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
Website Takeover Campaign Takes Advantage of Unauthenticated Stored Cross-Site Scripting Vulnerability in Popup Builder Plugin - Later on January 10th, 2024 we received an interesting malware submission demonstrating how a Cross-Site Scripting vulnerability in single plugin can allow an unauthenticated attacker to inject an arbitrary administrative account that can be used to ...
9 months ago Wordfence.com
Ardent hospital ERs disrupted in 6 states after ransomware attack - Ardent Health Services, a healthcare provider operating 30 hospitals across six U.S. states, disclosed today that its systems were hit by a ransomware attack on Thursday. It had to take its entire network offline, notify law enforcement, and hire ...
11 months ago Bleepingcomputer.com
Atlas Healthcare Confirms Data Breach Affecting Residents' Social Security Numbers - On October 14, 2023, Atlas Healthcare provided notice of a recent data breach after learning that an unauthorized actor was able to access the company's computer system. In this notice, Atlas explains that the incident resulted in an unauthorized ...
11 months ago Jdsupra.com
Changing How Healthcare Works: Big News in Communication - In a pivotal transformation within the healthcare industry, a prominent shift is currently unfolding. Direct Secure Messaging has emerged as a game-changer, modernising the way vital information is shared among healthcare providers, pharmacies, and ...
8 months ago Cysecurity.news
CVE-2022-20866 - A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This ...
2 years ago
How to Use Titan Security Keys With Passkey Support - Google's updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys ...
10 months ago Techrepublic.com
The key to connected care excellence - Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security solutions architect in the ...
10 months ago Blog.checkpoint.com
The reality of hacking threats in connected car systems - The automotive industry faces new cybersecurity challenges as vehicles become more connected. All parties in the manufacturing supply chain should follow key principles for vehicle cybersecurity, such as organizational security, risk assessment and ...
9 months ago Helpnetsecurity.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
1 month ago Cyberdefensemagazine.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)