Do No Harm. Matthew Webster

Do No Harm - Matthew Webster


Скачать книгу
but a global problem.

      Telehealth

      Home Healthcare

      Remote Patient Monitoring

      From a numbers perspective alone, it is clear that connected medical devices are not going away. They provide too much value for patients and institutions. All that said, having more devices that are less secure than they should be is creating more opportunities for hackers. Some of the problems are due to more records being digitized as part of the Affordable Care Act, but connected medical devices are most certainly a major concern for organizations.

      The key foundation for commerce is trust—trust in the exchange of money and/or good and services. Without trust, trade becomes riskier and less likely to happen. A thousand years ago you could touch, feel, see, and work with products. Today, in the IT world, we test products, read reviews, talk to peers, and so on. We install them, ensure the functionality, and do what we can to see if they work.

      To make matters worse, in many cases the interface to the machine completely obfuscates the operating system, making it difficult to assess the underlying technology. The manufacturer can also add security on the front end of the medical devices, making it seem as though the security is high. For example, some systems will provide strong password requirements such as long password length, complexity, password rotation, and so on, making it seem as though the system is built securely. That aspect of the system may be relatively secure, but not necessarily the rest of the product.

      Both Spectre and Meltdown are examples of what were zero-day vulnerabilities—flaws that, at the time, were out but, as they are too new, do not have remediation. Hardware (such as motherboards), operating systems, and internet-connected medical devices are all prone to zero-day vulnerabilities. They are the bane of IT and security practitioners alike. They are the kind of situation, due to the severity of the vulnerability, that requires companies perform out of band patching (also called emergency patching), which can seriously disrupt


Скачать книгу