dismiss

Clean Sweep Live Auction on Wed. February 27th. Click to view the full inventory

DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
SEARCH
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment
Advertisement

 

advertisement

 

Health IT Homepage

HIMSS Analytics releases new model to help adopt enterprise imaging Eight-stage DIAM model helps organizations track their progress

AI and personalized medicine to raise the bar in radiology reporting New innovations could provide myriad benefits to clinical workflow

The exam room of the future: Nuance unveils AI-based clinical documentation product at HIMSS Improving patient experience and freeing up physicians

Bitfury teams with MDW and Longenesis to create blockchain ecosystem for medical imaging Uphold, distribute and safeguard medical and diagnostic imaging

Hologic launches Unifi Analytics to curb mammo downtime Predicting tube failures before they happen and setting performance benchmarks

Health IT Product Showcase A few of the new solutions improving hospital workflow

My observations from the HIMSS meeting The Jacobus Report

Imaging IT market insights The analysts at MD Buyline provide tips for navigating the market

Moffitt Cancer Center secures radiology machines by ditching anti-virus software Speeding up software without compromising cybersecurity

Siemens focuses on digitalization at HIMSS Its expanded digital service portfolio will be on display

Five best practices for bringing new devices into the hospital securely

By Mike Kijewski

Cybersecurity has emerged as a critical risk to healthcare delivery organizations (HDOs) and their patient data. In 2017, there were 477 healthcare breaches reported to the U.S. Department of Health and Human Services (HHS) or the media, which affected a total of 5.579 million patient records, according to Protenus.

Story Continues Below Advertisement

THE (LEADER) IN MEDICAL IMAGING TECHNOLOGY SINCE 1982. SALES-SERVICE-REPAIR

Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.



Securing medical devices prevents them from becoming a conduit for an attack, while also ensuring the confidentiality, integrity, and availability of data stored on or transmitted to a device.

Engaging the security team in the procurement process will ensure best-in-class practices are brought to HDOs. Cybersecurity risks in particular cut across every major function and business line. We have identified five best practices when collaborating with IT, engineering, operations, legal, finance and others to bring new devices into an HDO:

● Understanding the flow of data. It's crucial to assess what type of data the medical device will create, store and transmit within the device as well as the broader healthcare organization. Device vendors should clarify whether the device has any removable media ports (e.g., USB). This will allow a risk assessment of the device to drive subsequent security implementation.

● Access Considerations. User authentication is the root cause in 44% of all medical device vulnerabilities, validating the importance of password complexity and a strict user provisioning process being supported by a device vendor. Clarity on whether the device supports encryption of data both at rest and in transit brings layers of redundancy to an HDO security posture.

● Ongoing Support. The importance of software patch management on devices cannot be overstated. Security evolves over time with the identification, addressing and managing of threats on an ongoing basis. The FDA recently published a preferential 60-day time frame for devices to be updated for known vulnerabilities – confirming a device vendor can accommodate this.

● Notifications. Monitoring device behavior is a requirement in the recent premarket cybersecurity guidance from the FDA. Vendor-supported analytics per serial numbered device (including information such as technical specifications, patching status and known vulnerabilities) can go a long way to supporting the HDO in fighting the asset management challenge they face. This device-specific insight can be used to meet the FDA requirement to identify an anomalous device behavior, diagnose the cause and alert the HDO when appropriate.
  Pages: 1 - 2 >>

Health IT Homepage


You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2019 DOTmed.com, Inc.
ALL RIGHTS RESERVED