DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Pediatrics
SEARCH
Aktueller Standort:
>
> This Story


Log in oder Register to rate this News Story
Forward Printable StoryPrint Comment
advertisement

 

advertisement

 

Health IT Homepage

Vulnerabilities found in infusion pump firmware Could enable dose or infusion rate manipulation

How important is protecting the patient health information (PHI) to your vendors? Outsourcing services comes with risks that must be addressed

Informatics, standardization and the next phase for enterprise imaging Life after silos is coming into focus

Roche and GE Healthcare release NAVIFY Tumor Board 2.0 Supports personalized treatment decision-making

Enterprise content management (ECM) systems are the rise Offering better data security, market may exceed $1.3 billion by 2023

Financial details of nearly 12 million patients at risk following AMCA breach Includes social security numbers, credit cards and medical information

Agfa investigates sale of Hospital IT and Integrated Care business Shedding $213 million unit will position company mainly as imaging vendor

Healthcare devices vulnerable due to legacy Windows operating systems: survey As Microsoft phases out old products, the install base remains

Verasonics settles legal dispute over software with SuperSonic Imagine Alleged patent infringement and misappropriate of trade secrets

Five tips for launching a successful virtual care program Telemedicine is revolutionizing the healthcare landscape

A lack of AI-based security and
inefficient protocols make IoT
healthcare devices vulnerable to
cyberattacks, says report

Lack of AI security puts IoT medical devices in danger of cyberattacks

by John R. Fischer , Staff Reporter
A lack of AI-based security tools and inefficient protocols by staff have made healthcare internet-of-things (IoT) devices easy targets for cybercriminals, according to the Vectra 2019 Spotlight Report on Healthcare.

The provider of AI detection tools for cybersecurity threats asserts in its findings that insufficient access controls, reliance on legacy systems and unpartitioned networks have left medical IoT devices vulnerable to hacking that could result in the theft of personally identifiable information (PII) and protected health information (PHI), as well as disrupt healthcare delivery processes. The report suggests that such risks could be mitigated with the inclusion of AI for detecting hidden threats in enterprise IT networks.

Story Continues Below Advertisement

THE (LEADER) IN MEDICAL IMAGING TECHNOLOGY SINCE 1982. SALES-SERVICE-REPAIR

Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.



"I think the reason for slow adoption otherwise is simply because the concept of internal network monitoring for proactive threat hunting is only a few years old. It takes time for market adoption of any new idea, starting with the forward thinking organizations followed by the mass market," Chris Morales, head of security analytics at Vectra, told HCB News. "There is also the secondary factor of many healthcare organizations having a lean security team. Anything new runs the risk of creating more work and noise. That has to be a factor in the decision making process of what technology to implement and use."

Healthcare organizations face challenges in managing legacy systems and devices due to their weak security controls. Both, however, provide important access to patient health information, ushering in the need for better understanding of network behavior so that risks of legacy systems can be managed and new technology can be leveraged to its full potential.

Policies and procedures that are not thorough and lack essential details can lead staff members to commit errors such as improper handling and storage of patient files, which cybercriminals can target and exploit as a weakness.

Utilizing Vectra’s Cognito threat-detection and response platform, the authors of the report assessed the actions and trends in networks from a sample of 354 opt-in enterprise organizations in healthcare, as well as eight other industries. The platform utilizes AI to collect, enrich and store network metadata with the right context to detect, hunt and investigate hidden threats in real time. It can scale to the largest organization’s networks with a distributed architecture made up of a physical, virtual and cloud sensors that prevent attackers from hiding by providing 360-degree visibility across cloud, data center, and user and IoT networks.
  Pages: 1 - 2 - 3 >>

Health IT Homepage


You Must Be Logged In To Post A Comment

E-Mail-Werbung
Erhöhen Sie Ihren Bekanntheitsgrad
Auktionen + Privatverkäufe
Den besten Preis erzielen
Geräte/Geräteteile kaufen
Den günstigsten Preis finden
Daily News
Die neuesten Nachrichten lesen
Übersicht
Alle DOTmed Benutzer durchsuchen
Ethik auf DOTmed
Unseren Ethik-Standard anzeigen
Gold-Parts Verkäufer-Programm
PH-Anfragen erhalten
Gold Service Dealer-Programm
Anfragen empfangen
Gesundheitsdienstleister
Alle Gesundheitsdienstleister-Tools anzeigen
Jobs/Training
Einen Job suchen
Parts Hunter +EasyPay
Angebote für Geräteteile erhalten
Kürzlich zertifizierte Benutzer anzeigen
Kürzlich zertifizierte Benutzer anzeigen
Kürzlich auf DOTmed bewertet
Kürzlich zertifizierte Benutzer anzeigen
Rental Central
Geräte billiger mieten
Geräte/Geräteteile verkaufen
Das meiste Geld erhalten
Servicetechniker
Hilfe und Beratung finden
Einfache Angebots-Anfrage
Angebote für Geräte erhalten
Virtuelle Messe
Service für Geräte finden
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2019 DOTmed.com, Inc.
ALL RIGHTS RESERVED