Connected medical devices represent one of the largest and fastest-growing segments of the Internet of Things (IoT). Connected devices from heart monitors to fitness trackers are helping healthcare providers to improve services and patients to be more proactive and informed about their health.
But such devices present significant challenges to managers of healthcare IT. Many have limited or no built-in passwords or other cyber security features.
Many IT management tools offer only limited or challenging support for IoT device management. IT leaders and their teams face a growing number of alternatives when considering medical device management solutions, each with a unique set of features, strengths, and weaknesses.
Connected medical devices: the current reality
Green Hills Software is a leading provider of so-called “embedded systems.” These are the operating systems and development tools that run and support connected devices that are not fully-fledged computers, including medical devices.
In late 2018, the company contacted about three dozen physicians, executives and other organizations that support, or work on behalf of, healthcare providers. Those respondents were asked multiple questions about cyber security.
- A solid 95% of the interviewees were aware that unsecured medical devices on healthcare networks can be used as beachheads to infiltrate the organization’s network and servers, allowing a cybercriminal to install malware or steal Electronic Health Records (EHR).
- Almost all IT executives and physicians interviewed were investing substantially in protecting their internal networks. However, only larger healthcare providers had the resources and the staff to institute official policies and procedures to ensure that procured medical devices are manufactured using industry best practices for safe coding and cybersecurity.
Interviewees were also asked their opinions of guidance provided so far by the U.S. Food and Drug Administration (FDA). While 30 percent of respondents were satisfied with current FDA guidance, 55 percent were not.
Those not satisfied believe FDA guidance needs to require device manufacturers to provide detailed information to make it easier for healthcare providers to compare the levels of security and safety built into a medical device. The hope is that the requirement for a software bill of materials (SBOM) will help in this regard.
The current reality of connected medical devices is both promising and challenging. The value of such devices to patient care is undeniable. However, many if not most healthcare providers don’t have the resources or influence needed to pressure manufacturers to improve cyber security. Many simply cannot wait for more or better FDA guidance and industry compliance.
Medical device management: what to do now
Protect your patients
Wherever possible, prohibit the use of connected medical devices that do not at least support changeable passwords. Encourage adoption of devices with integrated password, connection, and security management features. And educate and encourage patients to choose personal fitness monitors and other devices that can be secured.
Protect your data
Connected medical devices send and receive multiple types of data. Depending on the device, data can include current and historical EHR information, information about the device itself, and information for network access. Any and all of this data represents potential value to thieves and malefactors. Your organization must ensure that data is protected, wherever it is stored, used, or accessed, throughout its lifecycle.
Protect your network
To provide maximum protection of your data and your connected patients, your organization needs accurate, complete, and up-to-date information about your network. This must include information about all critical IT resources, their interconnections with each other and your IT services, and all network access requests and attempts.
Automated, comprehensive IT discovery and updates to your configuration management database (CMDB) can deliver the information you need to maximize protection of your IT estate. These features can also aid and improve compliance with business processes and regulations such as the US Health Insurance Portability and Accountability Act (HIPAA) and the European Union’s General Data Protection Regulation (GDPR).
(See, “ITSM in 2019: are you ready for GDPR?”)
Your organization must do everything possible to protect your network, your IT, and your patients from online threats. There could be much more than your business operations at stake.
Connected medical device management: Virima can help
Virima solutions can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users. Virima also makes it easy to create and deploy probes for discovering and monitoring Internet of Things (IoT) devices.
Virima solutions are easy to use and configure, and designed to work well with each other. These and other features can help you and your IT management team maximize the protection of your IT estate, your data, and your patients.
Read our healthcare case study to learn how Virima helped a leading US regional healthcare system achieve consolidated, accurate, complete, automated, repeatable discovery and mapping of its entire IT infrastructure and more than 150 services.
(Also see our recent BrightTALK webinar, “The Business Value of Intelligent IT Automation.”)
Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!