info@ehidc.org

 202-624-3270

Securing legacy medical devices is daunting – but not optional: Best Practices

Privacy & Cybersecurity

  • Privacy & Cybersecurity

    Exploring the ways in which we are protecting the privacy, security, and confidentiality of patient information.  

Securing legacy medical devices is daunting – but not optional: Best Practices

October 13, 2018

Securing legacy medical devices is daunting – but not optional: Best Practices

Between high-profile hacks and hospitals’ growing dependency on connected medical devices, cybersecurity is as relevant to healthcare as it’s ever been. And while providers and device manufacturers are rightfully making protection a priority for newly developed or purchased medical devices, older legacy devices pose the greatest security risk to healthcare organizations.  MobiHealthNews looks at expert opinions on this topic.  

Best Practices

  • Start at the beginning - Take the time to take inventory of relevant devices.  Identifying problems are crucial to being able to solve them.  
  • Prioritize threats - Assess the risk for attack for each medical device.
  • Consider consequences - What are the consequences if an attack succeeds?  What are the backup plans if a device fails?  
  • Build a baseline - What does normal traffic look like for these devices and networks?  
  • Plug holes - Be proactive and preventative when it comes to cybersecurity, while also being realistic about what can be achieved.  

The full article can be viewed at this link.  

 

Share