October 20, 2016 By Larry Loeb 2 min read

While the Internet of Things (IoT)-enslaving distributed denial-of-service (DDoS) attackers have hogged much of the public’s attention lately, the medical devices segment of the IoT has flown under the radar. The field is growing too quickly for security to keep up. Devices can be compromised individually, but they can also provide an attacker with a way into the overall health care infrastructure.

According to ABI Research, as reported by Help Net Security, medical IoT insecurity could endanger patient safety and impair patient care.

Medical IoT Spending to Skyrocket

Michela Menting, the research director at ABI Research, said that health care providers and original equipment manufacturers (OEM) will spend $5.5 billion on cybersecurity in 2016. Only $390 million of that figure will be dedicated to improving the security of medical devices, however.

OEMs will use the majority of that money to embed security into their hardware, as required by regulatory oversight agencies. OEMs must also spend money on reviews, analysis, penetration testing, patch development and over-the-air (OTA) updates when the device software is revised.

Medical devices have historically suffered from multiple vulnerabilities due to a variety of causes. The use of hardcoded passwords may help a service technician access the device, but it also provides a useful stepping stone for attackers. Many devices also lack an authentication mechanism — an issue that security leaders must address before the industry can achieve a reasonable level of security.

Squashing Silos

The overall environment today can be visualized as a set of stakeholder silos. The industry lacks a common effort to devise a standard of security and ensure all stakeholders are protected. ABI cited only a few companies that are significantly committed to medical cybersecurity. Additionally, the U.S. seems to be the only major nation devoting serious effort to this problem.

According to ABI, spending on medical IoT-connected devices will triple globally by 2021. Such an increase in use can only force the security problems of the devices to the forefront in the years to come.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today