Despite all the IT security risks, people still are better off with than without their medical devices

malicious actors can gain access to devices ranging from pacemakers to insulin pumps, with potentially fatal results
The US Food and Drug Administration this month warned manufacturers to step up their vigilance, saying it has learned of “cybersecurity vulnerabilities and incidents that could directly impact medical devices or hospital network operations.”
Officials say they know of no deliberate hacking of medical devices.
implantable devices like cardiac defibrillators, which could be reprogrammed by hackers who get into system’s wireless network.
the greater risk is from malware that accidentally gets into a device rather than the attacks in fictionalized programs
from a range of 10 to 15 meters (30 to 50 feet) the credentials needed to interrogate the individual implants remotely, could be retrieved.
in addition to implanted devices, hospital equipment such as monitoring systems, scanners and radiation equipment are connected to networks which could have lax security, creating similar security holes. Some heart and drug monitoring systems use open Wi-Fi connections that can be hacked
The vast majority of medical devices in hospitals I’ve been to use Windows XP or Windows 95. These are extremely vulnerable to computer malware
Attacks or insertion of malware could affect things like radiation therapy, or devices which mix nutrients for intravenous delivery
a strategy just based on antivirus or firewalls could be insufficiently effective.
Despite all the risks, people still are better off with than without these devices.
The chance of a targeted malicious attack against someone’s medical device is extremely low, and the last thing we want is for people to lose faith in these life saving devices
Advertisements
Explore posts in the same categories: techs

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: