DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Pediatrics
SEARCH
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment
advertisement

 

advertisement

 

Health IT Homepage

Five tips for launching a successful virtual care program Telemedicine is revolutionizing the healthcare landscape

Surgical Theater showcases first 360-degree AR patient engagement solution Enables users to walk 'inside' specific anatomy of patient

Smart communication with real-time situational awareness can help hospitals counter safety risks

New DICOM design flaw spells potential risks for image storing and sharing Enables hiding, protection and spread of malware

HDOs: Address IoT security governance today for a more secure tomorrow Implementing a solid program is the best defense against attack

VisualDx to develop decision support platform for ultrasound in space Provide basic guidance on ultrasound interpretation

HHS releases second draft of TEFCA for nationwide interoperability Requirements for sharing electronic health information

Want to reduce readmissions? Let’s start with keeping patients healthier Insights from Robin Hill, chief clinical officer at Vivify Health

Decision support software could reduce scans by 6 percent: MIT researchers Prevent overuse of powerful and costly imaging exams

CMS to add more telehealth benefits to Medicare Advantage plans Aiming for greater flexibility, lower costs

A lack of AI-based security and
inefficient protocols make IoT
healthcare devices vulnerable to
cyberattacks, says report

Lack of AI security puts IoT medical devices in danger of cyberattacks

by John R. Fischer , Staff Reporter
A lack of AI-based security tools and inefficient protocols by staff have made healthcare internet-of-things (IoT) devices easy targets for cybercriminals, according to the Vectra 2019 Spotlight Report on Healthcare.

The provider of AI detection tools for cybersecurity threats asserts in its findings that insufficient access controls, reliance on legacy systems and unpartitioned networks have left medical IoT devices vulnerable to hacking that could result in the theft of personally identifiable information (PII) and protected health information (PHI), as well as disrupt healthcare delivery processes. The report suggests that such risks could be mitigated with the inclusion of AI for detecting hidden threats in enterprise IT networks.

Story Continues Below Advertisement

THE (LEADER) IN MEDICAL IMAGING TECHNOLOGY SINCE 1982. SALES-SERVICE-REPAIR

Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.



“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” said Chris Morales, head of security analytics at Vectra, in a statement. “Improving visibility into network behavior enables healthcare organizations to manage risk of legacy systems and new technology they embrace."

Policies and procedures that are not thorough and lack essential details can lead staff members to commit errors such as improper handling and storage of patient files, which cybercriminals can target and exploit as a weakness.

Utilizing Vectra’s Cognito threat-detection and response platform, the authors of the report assessed the actions and trends in networks from a sample of 354 opt-in enterprise organizations in healthcare, as well as eight other industries. The platform utilizes AI to collect, enrich and store network metadata with the right context to detect, hunt and investigate hidden threats in real time. It can scale to the largest organization’s networks with a distributed architecture made up of a physical, virtual and cloud sensors that prevent attackers from hiding by providing 360-degree visibility across cloud, data center, and user and IoT networks.

Based on network traffic monitoring and metadata of more than three million workloads and devices, they found that attackers blend with existing network traffic behaviors to hide their intentions and carry out a number of approaches that set off risks for businesses and disastrous data breaches.

They include:

• Using hidden Hypertext Transfer Protocol Secure (HTTPS) tunnels to high command-and-control communications in healthcare networks. This enables external communication of information in multiple sessions for long periods of time that appears to be normal encrypted web traffic.
  Pages: 1 - 2 >>

Health IT Homepage


You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2019 DOTmed.com, Inc.
ALL RIGHTS RESERVED