That’s fake news. Real news COSTS. Please turn off your ad blocker for our web site.
Our PROMISE: Our ads will never cover up content.
Scott Trevino
Published: Wednesday, January 18, 2023 - 13:02 Nearly a quarter of surveyed healthcare cyberattack victims experienced increased mortality rates following a data breach, and more than half reported poorer patient outcomes due to longer hospital stays and delayed procedures. Healthcare has faced the highest average data breach cost—more than $10 million—of any industry for the last 12 years. The evidence is clear: Action must be taken to better prevent breaches and improve patient safety. Congress is considering medical-device cybersecurity legislation, but the process is arduous. With an average of two healthcare data breaches per day, healthcare systems can’t wait for bills to pass. And even if they passed immediately, the short-term effect would be minimal. Patients need cybersecurity for medical equipment now. An industry report conducted by Ponemon Institute reveals that healthcare organizations have an average of more than 26,000 network-connected devices and applications, and more than half have a known cyber vulnerability. These vulnerabilities are the primary way bad actors gain entry into a network. Yet only half of respondents in a 2022 cybersecurity survey included these assets in their cybersecurity strategy. The Senate Committee on Homeland Security and Governmental Affairs recommends the Senate pass the Healthcare Cybersecurity Act. The act requires the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) to collaborate on improving cybersecurity measures in hospitals and other medical facilities, and provide risk-mitigation training for healthcare personnel. The House passed the bill earlier this year. This fall, Congress rejected an amendment to the Medical Device User Fee Act (MDUFA) that would have given the FDA authority to require device manufacturers to include certain cybersecurity information in their premarket submissions. In May 2022, senators introduced the Strengthening Cybersecurity for Medical Devices Act. Under the proposal, the FDA must regularly update cybersecurity guidance, publish public information on resources and strategies to improve medical device cybersecurity, and issue a report identifying challenges in cybersecurity for medical equipment, including legacy devices. Also being considered is the Protecting and Transforming Cyber Health Care (PATCH) Act. The legislation would require original equipment manufacturers (OEMs) to provide information on a connected medical device’s security before it goes to market, including disclosures of vulnerabilities and defined processes and procedures to make updates and patches available to the device throughout its life cycle. To date, PATCH has not moved forward. The FDA is considering public comments on its highly anticipated draft guidance on medical device security, which instructs device manufacturers on how to approach cybersecurity for device design and associated premarket submissions. Under that guidance, OEMs would be required to create procedures to verify and validate a connected device’s design for a reasonable assurance of safety and effectiveness. The FDA recommends OEMs establish a secure product development framework encompassing all aspects of a product’s life cycle to reduce product vulnerabilities and satisfy medical device compliance safety requirements. Should these proposals pass, they would better fortify medical devices against breaches. But healthcare systems must act now to protect their patients. Healthcare systems should evaluate and refine their cybersecurity strategy by addressing current risks and creating a real-time threat-monitoring protocol. The process requires collaboration between clinical engineering and IT teams. The five tenets of the National Institute of Standards and Technology (NIST) cybersecurity framework lay out a strategy to get plans off the ground: 1. Identify 2. Protect 3. Detect 4. Respond 5. Recover Using the complete inventory created in step one of the NIST framework, cybersecurity teams can evaluate a device’s vulnerability, risk, and impact on patient safety to create a risk gauge. A comprehensive medical device cybersecurity solution with technology-enabled assessment can raise preparedness by managing inventory and monitoring, and flagging vulnerabilities based on a system’s priorities. The FDA just released an updated “Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook.” The document describes readiness activities that will enable healthcare systems to be better prepared for a cybersecurity incident involving medical devices. The updates emphasize the need for a diverse team, with clinicians, healthcare technology management professionals, IT, emergency response, and risk management staff participating in cybersecurity preparedness and response exercises. The FDA highlights considerations for dealing with widespread effects and extended downtime during cybersecurity incidents, and adds a resource appendix with tools and references. As Congress moves closer to passing medical device cybersecurity laws, healthcare systems must implement their own protections now. The new legislation won’t close all access points, so a system-specific risk assessment and remediation strategy is still imperative to protect patient health and data. Quality Digest does not charge readers for its content. We believe that industry news is important for you to do your job, and Quality Digest supports businesses of all types. However, someone has to pay for this content. And that’s where advertising comes in. Most people consider ads a nuisance, but they do serve a useful function besides allowing media companies to stay afloat. They keep you aware of new products and services relevant to your industry. All ads in Quality Digest apply directly to products and services that most of our readers need. You won’t see automobile or health supplement ads. So please consider turning off your ad blocker for our site. Thanks, Scott Trevino is the senior vice president of cybersecurity at TRIMEDX. In his role, Trevino leads efforts to define the strategy and deliver increasing value, growth, and evolution of TRIMEDX’s cybersecurity solutions. He collaborates cross-functionally with all parts of the business to drive the strategy and execution. Trevino is responsible for identifying trends in cybersecurity and technology, as well as recognizing and anticipating the evolution of client, market, and industry needs to translate them into market-leading solutions that meet the needs of and bring value to clients.Don’t Wait for Laws to Protect Medical Devices
Cybersecurity can’t wait
Why medical equipment?
What action is the federal government taking?
How can healthcare systems shore up their security?
Cybersecurity teams must identify a complete inventory of devices and software. With a detailed and precise account of all devices and their individual attributes, teams can view the scope of risks and vulnerabilities to create an accurate risk profile. This step also involves knowing cybersecurity policies and legal requirements.
Organizations must enable safeguards to protect their network, including access control, identity management, staff training, information protection policies, and device vulnerability remediation.
Successful cybersecurity plans should define monitoring strategies to quickly identify threats, vulnerabilities, and breaches.
Prepare for a breach by creating and practicing a response action plan, and establish processes for remediating or mitigating known vulnerabilities.
Healthcare systems must create a strategy to restore services and capabilities affected by a cyberattack to enable a quick return to normal operations.
Our PROMISE: Quality Digest only displays static ads that never overlay or cover up content. They never get in your way. They are there for you to read, or not.
Quality Digest Discuss
About The Author
Scott Trevino
© 2023 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute, Inc.