Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceHospitals & Medical Centers

Tackling the “Shock and Awe” of Medical Device Security One Step at a Time

By Cheryl L. Serra
healthcare-screen
November 26, 2019

Sometimes it’s hard to even consider tackling a problem because it’s so awesome in nature. Webster's defines awe as “a feeling of reverential respect mixed with fear or wonder.” Healthcare CIOs, CISOs and even members of board of directors express this sense of awe when discussing one of greatest security risk factors in their world — connected medical devices. Cybersecurity experts, however, offer advice: implement your security program incrementally so it won’t be so daunting.

Medical devices are ubiquitous in hospitals and with medical services providers. We need them to monitor, analyze and, increasingly, treat patients. Bleeding edge healthcare innovators are also working with next generation medical devices combined with robotics and informed by analytics to serve as “mechanical care providers.”

Connected medical devices allow providers to see their patients’ compliance with treatment protocols and detect or be alerted to problems before they become serious or adversely impact a patient’s health. This connectivity allows healthcare professionals to track trends and provide more effective patient care. But there is a healthy fear within the cybersecurity community that hackers can exploit security vulnerabilities in medical devices with relative ease, thereby endangering patients and putting a healthcare organization’s data assets at serious risk.

In October, an article called, “MITA Releases National Standard for Medical Device Security,” explores the publication of a voluntary standard that supports security risk management within healthcare organizations by providing standardized information on security control features integrated within medical devices. The announcement by the Medical Imaging & Technology Alliance also said the standard clarifies the roles of those involved in medical device security.

Research by companies that provide IoT and medical device security “shows healthcare’s limited resources and IT staffing gaps hinder the ability of organizations to transition into more secure platforms,” according to an August 2019 article in Health ITSecurity. “As healthcare continues to steadily increase the number of connected devices, the attack surface is expanding, and it’s becoming more challenging to successfully scale security.”

According to the “2019 HIMSS Cybersecurity Survey” regarding the initial point of compromise for significant security incidents in the past 12 months, 10 percent occurred because of medical device problems in hospitals and six percent were associated with vendor medical devices. In addition, 33 percent of survey respondents indicated they have embedded legacy (unsupported) operating systems in medical devices.

“Many healthcare providers report breaches of healthcare data due to a compromise of a business associate, according to data on reported breaches by the Office for Civil Rights at the US Department of Health and Human Services,” the survey notes.

Given the astonishing number of connected medical devices — Gartner forecasts that 14.2 billion connected things will be in use in 2019, and that the total will reach 25 billion by 2019, while the Statista Research Department says almost 161 million healthcare IoT devices are estimated to be shipped worldwide for installation in the year 2025 — the potential risk can be devastating from both human and organizational perspectives. The estimated number of connected medical devices is expected to increase from 10 billion to 50 billion over the next decade, according to the IBM Institute for Business Value. These are certainly some intimidating numbers for healthcare security leaders.

Vikas Khosla, Chief Digital Health Officer of Intraprise Health, sees the reality behind the statistics every day. Intraprise Health is a 100 percent healthcare-focused cybersecurity firm that helps hospitals, health systems, healthcare insurers and Business Associates ("vendors”) improve their cybersecurity programs with a specific focus on addressing third-party risks such as those posed by connected medical devices.

“The healthcare industry is struggling with protecting their sensitive information from the risks of medical devices,” he says. “But it’s really overwhelming for them. Even a small community hospital may have several hundred medical devices that have various levels of vulnerability. A large health system has thousands. All of these devices are provided by third-party vendors and the healthcare providers have very little control over the security the devices do or do not provide.”

He says many organizations don’t begin the arduous process of ensuring the devices are secure because “it’s such a huge lift.”

It’s also important to understand the process can take time and resources. As the FDA, which approves medical devices for use (they also list cybersecurity incidents on their website) notes, “The health care environment is complex, and manufacturers, hospitals, and facilities must work together to manage security risks.”

But working to control this risk is an incremental process, Khosla says. And as the adage goes, “Once begun, half done.” The first step of the process, he says, is proper governance, inventory and assessments to understand your weaknesses.

Often, organizations don’t know how many connected devices they have and what their vulnerability is. Some mistakenly believe the device vendor has ‘handled’ security because the vendor is a prominent brand in the marketplace. Wrapping their organizational head around the issue begins with understanding what devices they have and what risks are associated with these devices. Then, and only then, can they begin to resolve the security gaps. The fix may be as easy as a patch or more complicated, like network segmentation, a process that disconnects devices from the internet or separates them from the main network.

Since many organizations don’t have the staff or the expertise to do this, they may want to call in somebody who does. But it’s important to remember to “eat the elephant one bite at a time.”

For medical device security that means starting with aligning all stakeholders to establish a governance model showing responsibilities and decision-making roles. Every health system has a few different departments that have some responsibility for securing connected devices. Typically, the biomedical (or bioengineering), IT and information security teams need to be involved.

Next, there should be a medical device security policy, minimum-necessary security standards, as well as an incident response procedure if there ever is an attack or infection from malware. The effectiveness of your processes should be tested through some sort of table-top exercise on a periodic basis.

And maybe most importantly, you should maintain an inventory of your medical devices to the best degree possible. You can’t secure what you don’t know you have. If you make this an ongoing effort, eventually you will have a pretty complete inventory. If these foundational steps are put in place and part of a continuous program, you will have made significant strides in protecting your patients and securing your organization from one of the greatest cyber threats in healthcare today.

Understanding and categorizing the various risks posed by medical devices is the first step in getting past the “shock and awe” and protecting your organization from a breach.

KEYWORDS: cyber security cybersecurity healthcare cybersecurity hospital security medical device security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cheryl l serra headshot

Cheryl L. Serra is an award-winning writer and marketing professional who lives in coastal North Carolina. She started her career as a journalist and has worked in the public and private sector and covered a variety of topics, including healthcare and education.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare-screen

    Protecting patients and securing medical innovation, one device at a time

    See More
  • Internet of Things

    The IoT Cybersecurity Improvement Act: A first step in bolstering smart technology security

    See More
  • nozomi 4

    Tackling the challenges of detecting P2P botnets

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!