Over 150 New York Auctions End Today - Bid Now
Over 1050 Total Lots Up For Auction at Two Locations - MA 04/30, NJ Cleansweep 05/02

Medical device security

September 11, 2014
From the June 2014 issue of HealthCare Business News magazine
Identifying and mitigating risk

By Jeremy Molnar

The technology behind medical devices has advanced exponentially over the last few decades and has helped to streamline procedures and foster research. Unfortunately, the same technology has also been introducing security risks to data that have been left largely unchecked by most organizations.



In order to secure these devices and ensure the protection of data, it’s important to understand the architecture and associated risks affecting medical devices now. Modern medical devices are basically simplified computer systems — they are running an operating system and application specific to the device, and they have memory (and often even a hard drive). Each of these presents its own forms of risk and potential vulnerability. Despite this, medical devices frequently cannot be managed by IT due to U.S. Food and Drug Administration restrictions; however, IT may have the resources, tools, and processes for properly maintaining and securing computer systems in a health care environment.

Recently (specifically April 8th, 2014), Microsoft officially stopped supporting Windows XP. This means that critical vulnerabilities identified as affecting XP will not be addressed, leaving them susceptible to malware, hacking, software errors, and crashing. How does this affect medical devices specifically? Unfortunately, a large percentage of medical devices are still using XP as their backend operating system (OS), likely because it was the newest OS available when the devices were created. It was assumed that since these devices were using an embedded XP configuration, they were more difficult to compromise. Additionally, manufacturers have been resistant to push out supported security updates; in fact, some manufactures have been known to completely resist updating devices at all. This is likely due to the FDA certification process, as most changes or updates would require recertification which can be costly to the manufacturer. The result is devices being left out of an organization’s migration and patch management plans. As “Heartbleed” has recently shown, unmitigated vulnerabilities can result in a significant issue and risk to both systems and data.

Network connectivity is also often found in modern medical devices. Some newer devices may even have wireless capabilities. While the intent of this connectivity is to simplify the process of transmitting data to other systems such as an EHR, it has also made it significantly easier for attackers to attempt to compromise medical devices. In fact, an attacker may not even need to compromise the endpoint device to access its data. He or she could potentially access the data stream if the appropriate protections are not in place. The HIPAA Security Rule identifies the importance of encrypting data (both at rest and in motion), but it leaves it to individual organizations to determine how best to address the specification. This simply means either encrypt or have a very good reason for not encrypting. Unfortunately, a large number of organizations assume that strong perimeter defenses are enough to justify not encrypting. Of course, in these situations, a breach of the perimeter puts the entire network, systems (including medical devices), and data at risk of compromise.

You Must Be Logged In To Post A Comment