Fill out our form or call us at 978-659-3500 (8 a.m. - 6 p.m. EST)
“Dealing with security of data, and the equipment that we have at the hospital, is an ongoing concern,” says David Higginson, Chief Information Officer (CIO), Phoenix Children’s Hospital. “There’s many nights I am up worrying about it, and there isn’t a year that goes by where there isn’t a new threat that comes along.”
The proliferation of connected devices in healthcare has enabled new and innovative ways to deliver healthcare: mobile-enabled health devices can track a patient around the hospital or monitor them at home; a connected device can also be implanted under the skin, or in the heart. Hospitals are a prime target for cybercriminals as personal health information can be worth hundreds or thousands of dollars on the black market1. In the space of a few years healthcare has become the world’s most cyber-attacked industry, with data breaches occurring on an almost daily basis2. Threats vary in sophistication too. At the most destructive end of the spectrum a cyberattack can bring down whole systems, compromising patient records and crippling a hospital’s operations. The 2017 ransomware strain known as WannaCry spread around the world in a matter of hours and led to more than $4 billion in damage3. Clinicians were forced to use pencil and paper to record clinical data, attempt medical care without access to patient records, and use their personal mobile phones and tablets. In some cases, hospitals had to turn patients away.
Protecting electronic information is a central role of the CIO, and as quickly as each new security threat emerges, their task is to evaluate and assess the risk it presents to their organization to avoid patient information being compromised. The ongoing expansion of health systems is a big challenge to ensure security in and of itself. With rapidly growing integration and interconnection of disparate medical technology devices and systems where medical data is being increasingly exchanged, security threats grow. A new security frontier is connected medical devices, such as a cardiac defibrillator or an insulin pump. Hospitals and similar healthcare organizations have more medical devices4 with more automation, increasing amounts of healthcare data collected, analyzed and stored in these devices. “What really is the most concerning part to me is medical devices or medical equipment. We’ve been very focused in the past on our networks and our servers and our desktop computers. What people haven’t been as focused on is those pieces of medical equipment that have some kind of computing device or some kind of network connectivity in them,” says Mr.Higginson.
The need for more co-ordination between providers and manufacturers to deal with security concerns is a central plank of the response to new threats, particularly around medical device cyber security. Organizations such as HIMMS convene security working groups highlighting best practices, responses and responsibilities, and the legal and regulatory framework in which issues must be addressed. At Phoenix Children’s, regular security checks and simulated cyber-attacks are performed on medical equipment to test the robustness of systems and devices, to find where weaknesses might exist in their network. “We have to keep one step ahead,” says Vinay Vaidya, Chief Medical Informatics Officer at Phoenix Children’s, “We have drills, we have exercises, we have phishing attacks that we launch internally to see and check for vulnerabilities in our system, and we want to keep one step ahead of the criminals, to safeguard the health of our children.” It is critical for IT leaders to constantly assess their exposure. The US Food and Drug Administration’s (FDA) rules for cybersecurity are aimed at aiding manufacturers of medical devices in managing cybersecurity risks and call for manufacturers to create built-in security for all of their devices at all levels5. Hospitals need assurance regarding the security and privacy protection of medical devices. As such, technology partners must be committed to rigorous and comprehensive security plans that assure patient data is safe and connected devices are cyber resilient.
1 Forbes, ‘Your Electronic Medical Records Could Be Worth $100 to Hackers’ 2 HIPAA, Breach News 3 Reuters, ‘More Disruptions feared from Cyber Attack’ 4 Deloitte 5 Norton, ‘The Risks of Connected Healthcare Devices’
You might also be interested in:
“What people haven’t been as focused on is those pieces of medical equipment that have some kind of computing device or some kind of network connectivity in them”
David Higginson
Chief Information Officer at Phoenix Children’s Hospital
We work in partnership with health systems to help drive innovation, support their financial and operational goals, and enable their transformation in a value-driven era. The result can be both operational excellence and more connected, predictive and personalized care delivery.
What are your biggest challenges in informatics? Whether its interoperability across your enterprise or achieving greater standardization of care, we partner with you to deeply understand your infrastructure and operations, and deliver solutions that help your transform your health system. Reach out using the form below to get started.
You are about to visit a Philips global content page
ContinueSpletna stran je namenjena samo osebam, ki medicinske pripomočke uporabljajo kot profesionalci, vključno z osebami, ki opravljajo poklice v zdravstveni dejavnosti, osebami, ki delujejo za zdravstvene subjekte, ali subjekti, ki trgujejo z medicinskimi pripomočki kot profesionalci. Spletno mesto nikakor ni namenjeno potrošnikom ali splošni javnosti.
Ali ste oseba, ki izpolnjuje zgornja merila?