Cyber Security For The Internet of Medical Things

The healthcare industry increasingly relies on IoT networks to securely connect a growing variety of medical devices and equipment. These connected devices are transforming processes and the continuum of care in applications ranging from a hospital’s consignment inventory management to remotely controlling insulin pumps, heart-rate monitors, and other implantable devices using smartphones. 

The Internet of Medical Things (IoMT) has the potential to improve healthcare, save lives, and bring massive savings. But if not properly secured, these same devices can pose huge risks.

According to a recent report from Palo Alto's threat intellingence Unit 42, 83% of medical imaging devices are running on unsupported operating systems, making them potential avenues for attackers.  Attacks on medical devices like these can potentially disrupt the quality of care and allow attackers to steal patient data.

Now an IoT security technology for healthcare has been designed by Palo Alto Networks to protect medical devices from unauthorised access.  Using machine learning and crowd-sourced telemetry, the solution quickly and accurately profiles all devices on the network, even those never seen before. Through ML-powered visibility, it delivers deep insights on healthcare-specific devices and vulnerabilities to help improve data security and patient safety, while meeting the needs of both IT teams and biomedical engineering teams.

Palo Alto say that their technology provides healthcare organisations with “complete visibility, in-depth risk analysis, and built-in prevention so they can get the maximum benefits from this transformative technology while reducing risks to patients and their data.” The new solution is designed to ensure healthcare organisations can realize the benefits of IoT for patient care without sacrificing security. It even offers ML-powered policy recommendations to reduce manual effort; intrusion prevention to block exploits; sandboxing to detect and prevent IoT malware; and URL and DNS security to stop IoT attacks via the web.

The new security features include MDS2 document ingestion through which medical device manufacturers disclose the security-related features of their devices, allowing for deeper vulnerability analysis, tuned anomaly detection and specific recommended policies.

Another feature is operational insights that provide biomedical and clinical engineering teams visibility into how, when and where medical devices on their network are being used, according to futureiot.tech.  Solutions like these add small incremental cost to IoMT-based consignment inventory management systems, connected legacy medical equipment, and smartphone-controlled implantable healthcare devices, but the benefits they deliver are manifold. 

They significantly improve security while providing the opportunity to differentiate IoMT offerings based on the incalculable benefit of protecting patients from injury or death.

Kaspersky:             IOT For All:      I-HLS:      Deloitte:       HealthTech:      Image: Unsplash

You Might Also Read: 

Cloud Migration Challenges For Healthcare Organisations:

 

« Oxford Covid-19 Laboratory Hacked
President Biden’s Cyber Dilemma »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Radar Cyber Security

Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.