{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

How to Close the Loopholes on Medical Device Cybersecurity

Five steps for success

Derek Hills
Tue, 02/08/2022 - 12:03
  • Comment
  • RSS

Social Sharing block

  • Print
Body

The importance of medical device cybersecurity is growing exponentially. As more devices become connected to the internet, threats to public safety mount. Cybercriminals, formerly interested in stealing financial or medical records, have begun to essentially hold healthcare providers hostage by using ransomware to lock users out of medical devices. Even more sinister possibilities await.

ADVERTISEMENT

For example, McAfee researchers discovered vulnerabilities in two types of infusion pumps where unsuspecting patients could overdose at the hands of malicious hackers, HealthITSecurity reports.

Medical devices aren’t like typical IT endpoints, such as laptops, where security updates are pushed out over the internet by the manufacturer, and third-party applications alone can put up a defense. The risk to medical devices is more open-ended.

Where should quality management professionals start when implementing a cybersecurity strategy to close the loopholes on medical device safety? The process begins by recognizing the barriers to success within the health system itself.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us