Securing legacy medical devices is daunting – but not optional: Best Practices
Privacy & Cybersecurity
Securing legacy medical devices is daunting – but not optional: Best Practices
October 13, 2018
Securing legacy medical devices is daunting – but not optional: Best Practices
Between high-profile hacks and hospitals’ growing dependency on connected medical devices, cybersecurity is as relevant to healthcare as it’s ever been. And while providers and device manufacturers are rightfully making protection a priority for newly developed or purchased medical devices, older legacy devices pose the greatest security risk to healthcare organizations. MobiHealthNews looks at expert opinions on this topic.
Best Practices
- Start at the beginning - Take the time to take inventory of relevant devices. Identifying problems are crucial to being able to solve them.
- Prioritize threats - Assess the risk for attack for each medical device.
- Consider consequences - What are the consequences if an attack succeeds? What are the backup plans if a device fails?
- Build a baseline - What does normal traffic look like for these devices and networks?
- Plug holes - Be proactive and preventative when it comes to cybersecurity, while also being realistic about what can be achieved.
The full article can be viewed at this link.