{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

How to Prioritize Cybersecurity Risks in Medical Devices

Unpatched vulnerabilities will become increasingly susceptible to cyberattacks

Doug Folsom
Tue, 12/06/2022 - 12:02
  • Comment
  • RSS

Social Sharing block

  • Print
Body

Unpatched vulnerabilities remain a target of cyberattacks, and an ever-present risk for healthcare organizations. Medical devices pose an additional burden because patches are frequently unavailable for medical devices. So, dealing with the potential threat isn’t usually straightforward. The stakes are also high in healthcare, because cybersecurity risks can expose or hinder access to electronic protected health information (ePHI) or even harm patients if the equipment malfunctions or is inaccessible.

ADVERTISEMENT

Medical device cybersecurity hinges on knowing the vulnerabilities of each device and whether patches are available, as well as how critical each piece of equipment is to the overall function—and determining any risk to patient safety, among other factors. Continuous assessment and real-time risk measurement help prioritize surveillance efforts, raise red flags, and mitigate risk efficiently.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us