• Investing
  • Stock
Round Table Thoughts
  • Economy
  • Editor’s Pick
Home Editor's Pick Security IoT in Healthcare: Cybersecurity Best Practices
Editor's Pick

Security IoT in Healthcare: Cybersecurity Best Practices

by November 23, 2022
by November 23, 2022 0 comment
Share
0
FacebookTwitterPinterestWhatsapp

Healthcare providers are always pushing innovation to stay on the cutting edge of their industry. Quickly embracing technology that could provide improved healthcare to their patients. They might not always be willing to invest in IT and cyber security, which is a gamble with people’s lives just as much as using archaic medical techniques.

Securing all networked devices in the healthcare industry is crucial, especially IoT devices. IoT devices are some of the most overlooked networked devices due to their ease of connection and mobility. Security teams might easily lose sight of where these devices are and when they are in use. Healthcare IoT security can be improved greatly through AI-driven monitoring software and some best practices.

Healthcare IoT Security Best Practices

Attack Surface Visibility

For any cyber security approach to be successful and comprehensive the entire attack surface needs to be completely visible.

This implies that network engineers need to be aware of all the devices that are connected to the network of the healthcare institution. The attack surface, more often than not, extends beyond the physical network in the institution. Many institutions connect to external services, sharing and collecting information from the cloud or over VPNs. This is especially true when dealing with information about patients billing information or medical history.

Security professionals need to understand this and implement solutions that can monitor and continually discover the institution’s attack surface. If a parent or partner system does not adhere to the same level of cyber security standards, they become the weakest link and could compromise the entire chain of trust.

Segregated Internal Networking

Healthcare institutions have a multitude of disparate end nodes connected to their network. These include devices like stationary patient monitoring systems, file servers, security systems, workstations, and a great amount of mobile IoT devices.

Under normal circumstances, any type of network breach could be potentially devastating to an organization. Moreso when it comes to the healthcare industry, the lives of people hang in the balance, not to mention a treasure trove of personally identifiable and medical information.

Therefore, healthcare intuitions need to have segregated networks. The IT term for this is subnetting. Essentially various systems need to be grouped and isolated from other systems and devices on a hospital’s network. This allows for a basic countermeasure in the event of a network breach by threat actors. What it achieves is that it limits the threat actor’s ability to move laterally throughout the network.

This aggregation of devices can greatly limit the impact of a data breach as well as provide network monitoring systems with closed sectors for accurate and efficient monitoring.

Zero-trust Approach

Although this might seem like the latest buzzword in the cyber security industry, the zero-trust architecture can greatly increase the cyber security posture of any organization, not only healthcare institutions.

Zero-trust is an implementation of multiple technologies driven by user rights and authentication mechanisms. How is this different from the traditional method of authentication and trust paradigm? Legacy network security followed an approach where users were given access to trusted resources based purely on the fact that they form part of a specific user group or collection us users.

Users often ended up receiving more access than they needed to perform their duties. This meant that in the scenario where their user account was compromised the threat actor would gain access to multiple systems at once.

By implementing a zero-trust architecture the effective access that users must network resources is not only greatly reduced since they have to be given explicit access to what they need, but their access is also constantly being reviewed and adjusted.

In Conclusion

The importance of IoT Cyber security in the medical industry cannot be overstated. Not only is the institution’s business data and reputation at risk but also the lives of patients who are relying on necessary medical equipment. Threat actors can potentially cause irreparable damage to innocent people’s lives or even cause their death.

Health institutions need to make cyber security a clear priority by implementing practices as described above. Some hospitals, for example, even implement AI-driven attack surface scanning software that can alert them in real time about potential cyber risks.

The post Security IoT in Healthcare: Cybersecurity Best Practices appeared first on IoT Business News.

You Might Also Like
  • Honda recalls nearly 564,000 CR-Vs sold in 22 cold-weather states and D.C. over potential rust issue
  • Trump Media director accused of ‘hacking’ files in attempted corporate ‘coup’, lawsuit alleges
  • Trump Media stock sinks to new post-merger low
  • Listings for Stanley tumblers are still attracting dozens of bids on eBay for hundreds of dollars
Share
0
FacebookTwitterPinterestWhatsapp

previous post
Time to Rethink University Accreditation
next post
European Union Members Divided Over a Proposal to Cap Gas Prices

You may also like

Collapsed crypto exchange Mt. Gox is about to unload $9...

July 3, 2024

As ‘Dry January’ becomes more popular, some express sticker shock...

January 14, 2024

Even at $8M per Super Bowl commercial, ad executives say...

February 8, 2025

In-N-Out Burger bars employees in 5 states from wearing masks

July 20, 2023

Boeing taps aerospace veteran Kelly Ortberg to replace Dave Calhoun...

August 1, 2024

Walgreens announces price cuts on 1,300 items amid ongoing consumer...

May 30, 2024

Florida’s insurance industry faces upheaval amid Idalia cleanup

September 1, 2023

Dow slips for first losing day in nine as consumers’...

May 15, 2024

Credit card delinquency rates hit a nearly 12-year high

July 24, 2024

FTX lawyers accuse Sam Bankman-Fried of financing his criminal defense...

July 21, 2023

    Stay updated with the latest news, exclusive offers, and special promotions. Sign up now and be the first to know! As a member, you'll receive curated content, insider tips, and invitations to exclusive events. Don't miss out on being part of something special.


    By opting in you agree to receive emails from us and our affiliates. Your information is secure and your privacy is protected.

    Recent Posts

    • Krispy Kreme stock plunges after doughnut chain pauses McDonald’s rollout, pulls outlook

      May 8, 2025
    • Don’t Buy Robinhood Stock… Until You See This Chart Setup

      May 8, 2025
    • UnitedHealthcare sued by shareholders over reaction to CEO’s killing

      May 8, 2025
    • The Unpredictable Stock Market: How to Make Sense of It

      May 8, 2025
    • AMD CEO calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 7, 2025

    Popular Posts

    • 1

      Trump-era China sanctions ended by Biden may be...

      June 27, 2024 2,630 views
    • 2

      Walz’s honeymoon with China gets fresh scrutiny as...

      August 9, 2024 2,339 views
    • 3

      Biden appointee played key role in recruiting Chinese...

      June 25, 2024 2,320 views
    • 4

      Shein’s global ambitions leaves some cybersecurity experts fearful...

      July 10, 2024 2,302 views
    • 5

      Harris VP pick spent years promoting research facility...

      August 29, 2024 2,186 views

    Categories

    • Economy (7,009)
    • Editor's Pick (2,066)
    • Investing (538)
    • Stock (2,530)

    Popular Posts

    • 1

      Trump-era China sanctions ended by Biden may be revived under new House GOP bill

      June 27, 2024
    • 2

      Walz’s honeymoon with China gets fresh scrutiny as Harris camp blasts ‘lying’ critics

      August 9, 2024
    • 3

      Biden appointee played key role in recruiting Chinese businesses to Delaware: ‘Longtime friends’

      June 25, 2024
    • 4

      Shein’s global ambitions leaves some cybersecurity experts fearful of Chinese spy threats

      July 10, 2024
    • 5

      Harris VP pick spent years promoting research facility that collaborated with ‘Chinese military company’

      August 29, 2024

    Latest News

    • Krispy Kreme stock plunges after doughnut chain pauses McDonald’s rollout,...

      May 8, 2025
    • Don’t Buy Robinhood Stock… Until You See This Chart Setup

      May 8, 2025
    • UnitedHealthcare sued by shareholders over reaction to CEO’s killing

      May 8, 2025

    Categories

    • Economy (7,009)
    • Editor's Pick (2,066)
    • Investing (538)
    • Stock (2,530)

    Disclaimer: RoundTableThoughts.com, its managers, its employees, and assigns (collectively “The Company”) do not make any guarantee or warranty about what is advertised above. Information provided by this website is for research purposes only and should not be considered as personalized financial advice. The Company is not affiliated with, nor does it receive compensation from, any specific security. The Company is not registered or licensed by any governing body in any jurisdiction to give investing advice or provide investment recommendation. Any investments recommended here should be taken into consideration only after consulting with your investment advisor and after reviewing the prospectus or financial statements of the company.

    Copyright © 2024 RoundTableThoughts.com. All Rights Reserved.

    Round Table Thoughts
    • Investing
    • Stock
    Round Table Thoughts
    • Economy
    • Editor’s Pick

    Read alsox

    Why everyone is suddenly talking about...

    February 25, 2024

    DirecTV is pushing its pay TV...

    August 13, 2024

    Express files for bankruptcy, plans to...

    April 23, 2024
    Sign In

    Keep me signed in until I sign out

    Forgot your password?

    Password Recovery

    A new password will be emailed to you.

    Have received a new password? Login here