CIOApplications
static-image
  • Home
  • Applications
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Collaboration
      • Custom Software Development
      • CRM
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Operations Management
      • IT Service Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Mobile Application
      • Order Management
      • Parking Management
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Testing
      • Task Management
      • Unified Communications
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Construction
      • Contact Center
      • Education
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • Digital Transformation
      • Graphics
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Chatbot
      • Cloud
      • Collaboration
      • Contact Center
      • Esri
      • Human Resource
      • InsurTech
      • IT Service Management
      • Machine Learning
      • Manufacturing
      • Master Data Management
      • Procurement Tech
      • Robotic Process Automation
      • Salesforce
      • ServiceNow
      • Software Testing
  • Contact Center
  • Collaboration
  • Chatbot
  • Esri
  • Human Resource
  • InsurTech
  • Machine Learning
Specials
  • Specials

  • Business Continuity
  • Chatbot
  • Cloud
  • Collaboration
  • Contact Center
  • Esri
  • Human Resource
  • InsurTech
  • IT Service Management
  • Machine Learning
  • Manufacturing
  • Master Data Management
  • Procurement Tech
  • Robotic Process Automation
  • Salesforce
  • ServiceNow
  • Software Testing
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Security
Editor's Pick (1 - 4 of 8)
left
Leadership Framework for Building Elite Teams

Leadership Framework for Building Elite Teams
Douglas Duncan, CIO, Columbia Insurance Group

Four Reasons Why You Need a Third-Party Security Assessment

Four Reasons Why You Need a Third-Party Security Assessment
Jeff Cann, CIO, Encore Electric, Inc.

Information Security Against Cyber Attacks

Information Security Against Cyber Attacks
Brad Peterson, EVP & CIO, Nasdaq

 The Technology Project Life Cycle: Lessons Learned

The Technology Project Life Cycle: Lessons Learned
Tony Laska, SVP-CIO, BrickStreet Insurance

Implementing a Cybersecurity Program - The Journey of True Partnership with IT

Implementing a Cybersecurity Program - The Journey of True...
Maurice Edwards, Senior Vice-President Enterprise Risk, Mattress Firm

Information Governance = Data Governance + Disclosure

Information Governance = Data Governance + Disclosure
Tera Ladner, Director, Information Governance, Aflac

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!
Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Do You Suffer from Cloud Strategy Deficiency (CSD)?

Do You Suffer from Cloud Strategy Deficiency (CSD)?
Hiba S. Sharief, Vice President, IT, Oportun

right

Thank you for Subscribing to CIO Applications Weekly Brief

Managing Security Vulnerabilities in Connected Medical Devices

By CIO Applications| Friday, February 01, 2019
Tweet

securityConnected medical devices are evolving as the lifeblood of healthcare infrastructure. Some of these systems are running with significant security vulnerabilities that can greatly impact the functioning of the healthcare system. So the challenge of securing these devices is becoming increasingly important to health systems around the world. Below are certain recommended best practices for safeguarding those sensitive devices.

1. Establishing and maintaining communication with medical device manufacturer's security professionals to ensure that the devices have the latest measures in form of patches and ensured communication about threats. 

2. Installing security and updated system patches on devices can also help. The coded patches should be validated, distributed by medical device manufacturers and properly tested before implementation.

3. Assessing current security controls on networked medical devices can ensure efficient working and will not be easily hacked.

4. Assessing inventory traits should include a Media Access Control address, Internet Protocol address, network segments, operating systems, applications and other elements relevant to managing information security risks.

5. Implementing pre-procurement security requirements can help ensure the organization's minimum requirement for the device and network security is achieved.

6. Implementing information security assuring practices, such as security risk assessment of new devices, validation of vendor practices on both networks and facilities.

7. Implementing access control for clinical and vendor support staff. The process can include remote access, monitoring of vendor access and so on.

8. Developing and implementing network security applications and practices for device networks.

9. Allocating the right resources to support the operating costs to keep the connected medical devices safeguarded. It is important to do this cost analysis upfront to determine the cost-effectiveness of the security program, to identify a trusted partner and exploring advanced solutions.

As more network-connected medical devices continue to enter the healthcare IT infrastructure, security practices need to be in place. A strong urge for enforcing these practices can help fix the fast-growing issue to contribute in the long run of the organization.

Check out: Top Healthcare Security Solution Companies

tag

Information Security

inventory

Weekly Brief

loading
ON THE DECK

Top Vendors

Field Service 2021

Top Vendors

Previous Next
Tweets by CIOApplications

Read Also

Important Trends in Construction Technology

Important Trends in Construction Technology

Must-Have Features of E-Procurement Software

Must-Have Features of E-Procurement Software

Key Trends in Supply Chain Analytics and Optimization in 2021

Key Trends in Supply Chain Analytics and Optimization in 2021

How COVID-19 Impacted the Future of Insurtech

How COVID-19 Impacted the Future of Insurtech

Three Benefits of Smart Technology in Contact Centers

Three Benefits of Smart Technology in Contact Centers

Smart Parking Systems to Reduce Parking Challenges for Drivers

Smart Parking Systems to Reduce Parking Challenges for Drivers

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplications.com/news/managing-security-vulnerabilities-in-connected-medical-devices-nid-3259.html