A podcast featuring our CEO, Justine Bone, explaining the need for risk management and security in the healthcare industry.

Risk Management and Security for Hospital Medical Devices

MIAMI, Fla., June, 2018 – Risk management and security for hospital medical devices needs more than technology, providing only a partial and not a complete solution. Consequently, CEO suites feel greater urgency to identify and prevent potential cyber-security threats before they occur.

Health data has become far more valuable than even credit card data for cyber-security hackers and thieves to sell on the black market.

In the podcast, information management and security expert, Justine Bone elaborates why relying technology alone as a strategy places more hospitals at risk of losing trust with providers, patients, and the communities they serve.

Medical devices used in the hospital have proliferated, from monitors to scanners to electronic tools, such as the EMR, that record confidential patient data. Many hospital medical, clinical, and back-office users rely on medical devices to accurately record, view, and maintain patient diagnostic and treatment records.

As medical devices remain in widespread use in the hospital, many devices become vulnerable with age and out-of-date software. Potential security breaches are a constant threat. The demand to make devices interoperable with each other adds one more layer of complexity to the mandated need for patient privacy.

Listen to Podcast



Source: Health Thought Leaders One-to-Many
Facebook LinkedIn Twitter Email
post
Author
Richard Oak
Technology Lead

Richard Oak is Technology Lead at MedSec where he focuses primarily on the development of secure products for the healthcare industry. Prior to MedSec, he served as a lead cyber security specialist for BAE Systems Applied Intelligence, where he served a critical role in the development of highly innovative, technical solutions for the UK government. Mr. Oak has also served a number of key roles at QinetiQ (one of the UK's leading defence research companies) where he developed a number of novel, patent-protected security technologies, and supported the deployment of these technologies to various arms of the UK military and Ministry of Defence. Patented technologies include a novel method for distributing quantum cryptography keys within an optical star network and BreakWall - a network device that provides an "IP-Break", preventing the spread of low level network attacks.