Medical Device Management: Challenges and Opportunities

Share on linkedin
Share on facebook
Share on twitter

Connected medical devices represent one of the largest and fastest-growing segments of the Internet of Things (IoT). Connected devices from heart monitors to fitness trackers are helping healthcare providers to improve services and patients to be more proactive and informed about their health.

But such devices present significant challenges to managers of healthcare IT. Many have limited or no built-in passwords or other cyber security features. Many IT management tools offer only limited or challenging support for IoT device management. And IT leaders and their teams face a growing number of alternatives when considering medical device management solutions, each with a unique set of features, strengths, and weaknesses.

Connected Medical Devices: The Current Reality

Green Hills Software is a leading provider of so-called “embedded systems.” These are the operating systems and development tools that run and support connected devices that are not fully-fledged computers, including medical devices. In late 2018, the company “contacted about three dozen physicians, executives and other organizations that support, or work on behalf of, healthcare providers.” Those respondents were asked multiple questions about cyber security.

  • “A solid 95% of the interviewees” were “aware that unsecured medical devices on healthcare networks can be used as beachheads to infiltrate the organization’s network and servers, allowing a cybercriminal to install malware or steal Electronic Health Records (EHR).”
  • “Almost all IT executives and physicians interviewed were investing substantially in protecting their internal networks. However, only larger healthcare providers had the resources and the staff to institute official policies and procedures to ensure that procured medical devices are manufactured using industry best practices for safe coding and cybersecurity.”

Interviewees were also asked their opinions of guidance provided so far by the U.S. Food and Drug Administration (FDA). While 30 percent of respondents were satisfied with current FDA guidance, 55 percent were not. Those not satisfied believe “FDA guidance needs to require device manufacturers to provide detailed information to make it easier for healthcare providers to compare the levels of security and safety built into a medical device. The hope is that the requirement for a software bill of materials (SBOM) will help in this regard.

The current reality of connected medical devices is both promising and starkly challenging. The value of such devices to patient care is undeniable. However, many if not most healthcare providers don’t have the resources or influence needed to pressure manufacturers to improve cyber security. And many if not most simply cannot wait for more or better FDA guidance and industry compliance.

Medical Device Management: What To Do Now

Protect Your Patients. Wherever possible, prohibit the use of connected medical devices that do not at least support changeable passwords. Encourage adoption of devices with integrated password, connection, and security management features. And educate and encourage patients to choose personal fitness monitors and other devices that can be secured.

Protect Your Data. Connected medical devices send and receive multiple types of data. Depending on the device, data can include current and historical EHR information, information about the device itself, and information for network access. Any and all of this data represents potential value to thieves and malefactors. Your organization must ensure that data is protected, wherever it is stored, used, or accessed, throughout its lifecycle.

Protect Your Network. To provide maximum protection of your data and your connected patients, your organization needs accurate, complete, and up-to-date information about your network. This must include information about all critical IT resources, their interconnections with each other and your IT services, and all network access requests and attempts.

Automated, comprehensive discovery and updates to your configuration management database (CMDB) can deliver the information you need to maximize protection of your IT estate. These features can also aid and improve compliance with business processes and regulations such as the US Health Insurance Portability and Accountability Act (HIPAA) and the European Union’s General Data Protection Regulation (GDPR).

Your organization must do everything possible to protect your network, your IT, and your patients from online threats. There could be much more than your business operations at stake.

Connected Medical Device Management: Virima Can Help

Virima solutions can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users. Virima also makes it easy to create and deploy probes for discovering and monitoring Internet of Things (IoT) devices. Virima solutions are easy to use and configure, and designed to work well with each other. These and other features can help you and your IT management team maximize the protection of your IT estate, your data, and your patients.

Read our healthcare case study to learn how Virima helped a leading US regional healthcare system achieve consolidated,  accurate, complete, automated, repeatable discovery and mapping of its entire IT infrastructure and more than 150 services. Then, contact Virima today. Let us help your business manage and secure connected medical devices effectively. (And make sure to see and hear our recent BrightTALK webinar, “The Business Value of Intelligent IT Automation.”)

Summary:

Medical Device Management: Challenges And Opportunities

Connected medical devices represent one of the largest and fastest-growing segments of the Internet of Things (IoT). Connected devices from heart monitors to fitness trackers are helping healthcare providers to improve services and patients to be more proactive and informed about their health. Such devices present significant challenges to managers of healthcare IT. Many have limited or no built-in passwords or other cyber security features. Many IT management tools offer only limited or challenging support for IoT device management. And IT leaders and their teams face a growing number of alternatives when considering medical device management solutions, each with a unique set of features, strengths, and weaknesses. Medical Device Management: What To Do Now: 1. Protect your patients. 2. Protect your data. 3. Protect your network. Your organization must do everything possible to protect your network, your IT, and your patients from online threats. There could be much more than your business operations at stake.

Share on linkedin
Share on facebook
Share on twitter

Subscribe to Our Newsletter

More to Explore

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Service mapping - the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to service…

The world of service management has changed as technology has shifted from providing tools for administrative support to being fully embedded in the delivery of the business’ core function. There’s a world of difference between using an accounts payable system…

The Configuration Management Database (CMDB) provides a single database that contains information about the enterprise’s assets, both logical and physical. In modern service management platforms, it provides core functionality that is referenced by all of the service management practices, including…

The importance of discovery comes from what it provides to the users of the Configuration Management Data Base (CMDB): trustworthy data and greater speed to value. Without discovery, the CMDB is built by feeds and data entry, which can lead…

There is an old saying that you can’t manage something unless you can measure it. Asset discovery can provide you with accurate and up-to-date data and information about everything you use in IT. You can then develop metrics using the…

Atlanta, Mar 19, 2020 (Issuewire.com)  - Virima Technologies Inc, a provider of CMDB, Discovery, IT Asset Management and IT Service Management (ITAM & ITSM) solutions, today announced that it has recently completed its Service Organization Controls 2 (SOC 2) examination under the Statement…

The most significant ServiceNow CMDB best practice is having a system with data you can trust.  ServiceNow will tell you that your stakeholders will tell you that and IT service management (ITSM) professionals will tell you that.  Achieving high-quality configuration…

CMDB - configuration management database - value potential is undisputed, you need to be careful and not blindly jump into implementation without having a clear plan in place about how this powerful tool will be used within your organization.  Here…

The past decade has introduced a tremendous change in the IT industry.  If you were to compare your IT ecosystem today with how it was ten years ago, you would likely find it hard even to recognize that you’re looking…