Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Protecting patients and securing medical innovation, one device at a time

By Natali Tshuva
healthcare-screen
December 11, 2020

“How can I trust my heart when it’s running on proprietary code?”

With this unsettling question, cybersecurity researcher Marie Moe – who successfully hacked her own pacemaker – crystallizes the vulnerability of life-saving medical devices running on software code and connected to the Internet.

Without effective cybersecurity protection, any connected medical device – including infusion pumps, pacemakers, smart pens, vital signs monitors, and more – is at risk of attack, whether it is connected to a hospital network or is one of the millions of distributed devices not connected to any network. This jeopardizes the lives of the millions of patients who depend on them.

With multiple IoT devices connected to the hospital’s network containing no security, they are bound to serve as the gateway of choice for hackers seeking the easiest way in. Entire hospital networks could then be infected with crippling ransomware. In a joint cybersecurity advisory issued in October, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation, and the Department of Health and Human Services warned of “an increased and imminent cybercrime threat” to hospitals and healthcare providers amid the COVID-19 pandemic, signaling that hackers are seeking to exploit the crisis.

Among the latest victims of this upsurge in criminal activity is the University of Vermont Health Network, which had to delay chemotherapy treatments, biopsies, and mammogram appointments as it grappled with the fallout of an attack that began the week of October 25th. Leaving Internet of Medical Things (IoMT) devices unprotected risks more such episodes, with disruptions in treatment, exposure of confidential patient data, and significant financial losses. Indeed, 82 percent of healthcare organizations had already been targeted by IoT device attacks in 2019, before the COVID-era spike in cybercrime and the ensuing escalating threats to IoMT devices.

Given the diverse range of threats – from potentially catastrophic infiltrations of entire healthcare networks to possibly lethal hacks of individual distributed devices – improving cybersecurity protection for connected medical devices is imperative.

Device manufacturers must assume the burden of responsibility for ensuring that their devices are equipped with uncompromising cybersecurity protection. The stakes – the lives of millions of patients who depend on IoMT devices – could not be higher.

The Threat to Patients

Take the estimated 1.25 million permanent pacemakers implanted across the globe every year. A cybercriminal who hacks one of them could reduce the pacemaker’s battery longevity or increase the device’s activity, destabilizing the user’s heart functions. Because of these very risks, in 2017 the Food and Drug Administration recalled 465,000 pacemakers manufactured by Abbott’s.

Meanwhile, the insulin pumps relied upon by patients with chronic conditions like diabetes are also vulnerable to cyberattacks. For instance, CISA recently issued an advisory regarding a vulnerability discovered in Becton Dickenson’s Alaris 8015 PC Unit and Systems Manager. This vulnerability could potentially serve as a gateway for a denial of service (DoS) attack.

DoS attacks could be devastating in any circumstance, but the threat is particularly severe at a time when hospital manpower and resources are being taxed to the limit.

While the potential for fatalities is reason enough to take IoMT cybersecurity seriously, the risk also extends to patient privacy. Case in point: The “smart pens” that medical professionals utilize to quickly access patient records. The Mozilla Foundation has classified these devices as “privacy not included” due to backdoor vulnerabilities that could lead to the leak of patient information. Similarly, vital sign monitors generally come with poor encryption protocols for Bluetooth connectivity, raising the prospect that hackers could use these devices as entry points into health systems’ networks, where they could steal patient data for financial gain.

The Gateway Threat

Therein lies a critical point about IoMT cybersecurity: protecting individual devices is critical to also protecting entire health networks. Hospitals and healthcare systems are particularly attractive targets for malicious cyber actors given that they store vast amounts of sensitive, sellable data that could be held at ransom.

These risks do not exist at the merely hypothetical level. Indeed, it is possible that the dramatic spike in cyber-attacks targeting healthcare facilities amid COVID-19 can be attributed at least in part to hospitals’ increased reliance on IoT telemedicine devices to provide patient care.

The simple truth is that these networks are only as secure as their weakest link – and with an estimated 161 million IoMT devices on the market, the sheer scale of vulnerability is difficult to quantify.

Many of those devices are distributed and not connected to hospital networks, but as Moe’s hack of her own pacemaker attests, even those devices are vulnerable to attack. With more patients receiving at-home, virtual care during the COVID-19 pandemic and using connected devices to manage their care, the ability to protect these mission-critical devices in the most sophisticated way possible is crucial.

Without on-device cybersecurity protection, IoMT devices are ticking time bombs. But because network-level threats are the most potentially damaging, the emphasis has traditionally been on providing cybersecurity protection to the healthcare network itself.

Yet it should be abundantly clear by now that this approach is insufficient. In fact, it is akin to locking your front door, only to leave all the house’s windows open. By the time an intruder enters, it is already too late.

Scalability is critical to IoMT cybersecurity, as there is no single magic-bullet solution that will address all vulnerabilities on all devices across all systems. But when IoMT devices are secured from within, devices and networks will be better fortified against cybercriminals.

Innovation in medical technology has given rise to a veritable plethora of devices that are saving the lives and improving the quality of life for millions of patients around the world. The IoMT industry’s transformative impact is difficult to overstate – and in the years to come, millions more are slated to benefit from its groundbreaking solutions. To continue protecting patients, the industry must commit to protecting the devices they rely upon.

KEYWORDS: cyber security Internet of Things risk management

Share This Story

Natali tshuva

Natali Tshuva is the CEO and co-founder of IoT cybersecurity company Sternum.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!