November 6, 2017 By Scott Koegler 2 min read

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches.

Stolen medical records are 10 times more valuable to fraudsters than credit card credentials. Even though medical devices don’t house full patient records, they can be targets if they are connected to networks. Networked medical devices are part of the Internet of Things (IoT) and extend the endpoints by which intruders can gain access to computing systems that contain patient data ranging from medical records to financial information.

Cyberbreaches have devolved from straightforward data thefts to acts of mischief that can cause disruption. Health care organizations should review any medical devices that connect to networks to protect their infrastructure and patients from malicious acts.

What Medical Technologies Are Vulnerable?

Connected medical devices use various types of software to perform their functions. Health care organizations generally assume that these devices meet the relevant specifications because the manufacturers execute FDA software validation processes to assure their products perform as intended. That validation process reviews the device, vendor-created software and any OTS software used to deliver the functionality intended.

OTS software can include operating systems such as Windows or Linux, utility programs such as Adobe Flash or interface components such as text editors. The device itself may work as intended, but because cybercriminals continuously search for vulnerabilities in any networked system they can access, these devices are subject to intrusion and exploitation.

The range of systems that can be affected includes some of the most important devices used for diagnostics and patient care. The FDA lists examples including “systems that obtain, archive and communicate pictures on networks within health care facilities, such as computed tomography (CT), magnetic resonance (MR), ultrasound (US), nuclear medicine (NM) and endoscopy; systems that monitor patient activity, such as electrocardiographic (ECG) systems; and systems that communicate with clinical laboratory analyzers, such as laboratory information systems.” That encompasses computers, routers and switches that connect operating rooms to databases.

Securing Medical Devices Is a Team Effort

IT professionals at health care organizations are accustomed to managing updates and patches for their computing environments, but medical devices are generally under the purview of the practice and maintained by manufacturers. The FDA stated that manufacturers have received guidance by way of updates and restatements of the agency’s rules regarding the use of OTS software.

Device manufacturers are responsible for the safety of their software, according to the FDA’s Quality System regulation. While the manufacturers are not required to retest their systems when they issue patches and updates, they need to keep their systems compliant with their original validation.

Health care facilities should take responsibility for the safety of their patients and their data systems by performing a comprehensive inventory of their connected medical equipment. Once they have identified the equipment and associated manufacturers, they should contact each manufacturer to request system status information, as well as assurance that software updates and patches have been applied.

Cybersecurity is a shared responsibility. Medical facilities deal with a large portion of the world’s population and house troves of sensitive information. The medical devices they use to make diagnoses and deliver treatment must be kept up to date to keep this data safe.

Listen to the podcast: Data Security Insights from a Health Care Insider

More from Healthcare

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Ransomware on the rise: Healthcare industry attack trends 2024

4 min read - According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023.For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. The bad news is that for the 14th year in a row, healthcare tops the list with the most expensive breach recoveries, coming in at $9.77…

Cybersecurity risks in healthcare are an ongoing crisis

4 min read - While healthcare providers have been implementing technical, administrative and physical safeguards related to patient information, they have not been as diligent in securing their medical devices. These devices are critical to patient care and can leave hospitals at risk for cyberattacks, causing major disruptions to patient care. In fact, 88 million individuals were affected by large breaches, compromising vast amounts of electronic protected health information (ePHI) last year according to the U.S. Department of Health & Human Services. This year,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today