Get notifications!

After the Dust Has Settled: GDPR in Healthcare

It's been more than a year since the General Data Protection Regulation (GDPR) has taken effect. The European Commission's wide-reaching law was designed to protect the privacy of EU citizens and residents while pushing businesses to handle people's personal information more sparingly and with greater security and sensitivity. 

How Cybersecurity Factors into the Medical Device Procurement Process

In 2018, the global medical device and clinical asset market was worth approximately $8.98 billion. By 2025, it’s estimated that i...

How MDS² Data Can Inform Smarter Medical Device Workflows

In 2008, Nema (the National Electrical Manufacturers Association), together with HIMSS (Health Information and Management Systems Society) and a number of other security experts and government agencies, produced a short document template for manufacturers to use in order to describe the vital security properties of their devices.

The Top 4 Problems Hospitals Face When Addressing Cybersecurity

It's already a well-known fact: cybersecurity constitutes a major challenge for connected healthcare operations, regardless of their unique organizational structures and processes. When each cyberattack costs healthcar...

──────
Your Finger on the Cyber Pulse!

Thank you for visiting the CyberMDX blog, a space devoted to exploring the intersection of healthcare management and cybersecurity.

Let us be your go-to resource for technological trends, best practice techniques, and cyber intelligence surrounding your connected medical ecosystems.

We encourage active participation in this vital conversation, so comments are welcome. If you're interested in contributing content, please reach out by email.

MOST RECENT POSTS

MOST READ POSTS

Load Posts

How Hospitals Prioritize Digital Risk Management

In the last several years, data breaches and cyber attacks on healthcare organizations have been in the news with alarming frequency.

HealthOps: The Next Frontier of Healthcare Management

This article is the final installment of a three-part series. We've already examined how those traits and trends converged around the principle of agility. Now, we'll discuss how the push for...

Smarter, Lighter, More Proactive: The Strategy of Business Agility

This article is the second installment of a three-part series. In the previous installment, we examined how technology evolved and how it has culminated in the streamlined, automated, intelligence...

The Internet of Medical Things (IoMT) Punctuates a Century of Progress

"When wireless is perfectly applied, the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.”

Why It’s Wrong to Sync Medical Device Patching & Scheduled Maintenance

Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to...

How Medical Device Cybersecurity Complements Physical Access Control

It’s only reasonable that access to sensitive medical devices should be restricted to those who require it. Physical access guidelines are designed to ensure that only professionals with the...

Windows DejaBlue: Lookalike RDP Flaws Emerge Months After BlueKeep

On August 13, 2019 Microsoft utilized “Patch Tuesday” to release 36 new CVEs. Of those vulnerabilities, four stand out for their striking similarity to the BlueKeep vulnerability that sent shock...

Everything HDOs Need to Know About URGENT/11

On July 29th, 2019, eleven vulnerabilities affecting the “VxWorks” Real Time Operating System (RTOS) were publicly disclosed. Since these vulnerabilities were all reported by the same source and...

In Perspective: the Baltimore Hack Attack

The world is a dangerous place. Perhaps it’s always been that way. Nature is governed by evolutionary competition, politics take shape where interests and power meet, and economics are ruled by...

Why Cybersecurity is Important for Biomedical Engineers

Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day...

How to Track and Act On Clinical Asset Utilization Insights

HDOs occupy a unique position: on the one hand, their focus is on patient care, and their success is measured by health outcomes. On the other hand, they are businesses, with investors,...

New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story

For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter...

Why CVE-2019-5599, AKA SACK Panic, Is Causing Headaches

On June 18, 2019, Netflix researchers, together with MITRE, issued an advisory containing four vulnerabilities relating to how Linux handles TCP Selective-Acknowledgement (SACK) at the kernel...

Cyber-Enabled Hospital Merger and Acquisition Management

The healthcare industry in the US has been facing widespread disruption for some years. The Affordable Care Act in 2010 demanded that the industry carry out wholesale changes to its processes and...

CVE-2019-10962 & IoT Security Threats From "Innocent" Objects

At one point early on in the beloved C. S. Lewis children’s novel, The Lion, the Witch and the Wardrobe, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity,...

3 Best Practices to Guide Your Healthcare Automation

The climate for healthcare organizations is a challenging one, with healthcare costs expected to rise by 6.5% over the next year. Between tighter compliance regulations, increased competition, and

How Cybersecurity Enables Medical Device Regulatory Compliance

For healthcare organizations, regulatory compliance is serious business. Non-compliance not only carries serious ethical implications and threatens the loss of public trust, but even from a purely...

The BlueKeep Vulnerability Is Stalking Hospital Halls

On May 14, 2019, Microsoft published an advisory for a newly discovered remote code execution vulnerability. Given the identifier CVE-2019-0708, the vulnerability has been more popularly named...

Healthcare Network Security: Can’t My NAC Knock Back A HIT Attack?

Unless you’ve been living under a rock for the last 10 years, you’ve heard of the Internet of Things, or IoT as it’s commonly abbreviated. The subset of IoT belonging specifically to healthcare...

Where Medical Equipment Inventory Management & Cybersec Meet

Hospitals have an average of 15 to 20 devices per bed, which means even a comparatively small 100-bed hospital is home to thousands of medical devices, most of which are connected to the hospital...

Top Tips for End of Product Life Health Technology Management

Today’s hospitals are centers of advanced technology, with upwards of several thousand medical devices and clinical assets under their roof. The US is home to 6,210 hospitals, each with 50 to 500...

Clinical Cybersecurity Explained

Picture this: you're a doctor at Holy Mountain’s Heart & Vascular Center. You're running late. Rushing past a waiting room full of patients in need of care, you hurry to your office and unlock the...

Cybersecurity as a Medical Device Quality Assurance Imperative

Though cybersecurity is most closely associated with the IT department, the truth is that it affects and touches all aspects of an organization. Indeed, even the most devoted IT professionals...

The Cyber Component In Medical Device Quality Assurance Training

Cybersecurity is currently one of health care’s largest concerns. The unlawful manipulation of medical devices locally, or more recently remotely, via malware and ransomware attacks, represents...

Cybersecurity: Key to the Hospital Strategic Planning Process

Hospitals operate in a challenging environment: relationships with insurers, state as well as federal rules and regulations, staff shortages, emerging treatments, new clinical technologies, and...

5 Scary Real-Life Cyber-Attacks You Probably Never Heard About

It’s often said there’s a statistic to support any story you want to tell, a fact that’s borne out by the worrying increase in fake news, but some are repeated so often they’re worth listening to:

Endpoint Detection & Response: Key to Hospital Network Security

Spurred by competition, razor-thin operating margins, and government regulation, healthcare organizations are under immense pressure to quickly and regularly implement new technologies.

Why Strong Healthcare IoT Security Requires Specialized Solutions

The rush to adopt IoT devices in consumer and business markets is well documented, but the scale of uptake comes at a cost: the increased risk of cyber attack. More connected devices and the...

Cybersecurity 101: Medical Technology Edition

The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...

Healthcare Cybersecurity Predictions for 2019

Like most business units at this time of year, biomedical and clinical teams will be reflecting on the last 12 months and trying, as best they can, to figure out what the new year will bring....

Where Healthcare Management, Spectre and Meltdown Meet

It’s been a year since Spectre and Meltdown — the hardware vulnerabilities discovered collaboratively by Google’s Project Zero and others — went public. Those vulnerabilities rightly garnered...

12 Top Healthcare Conferences Not to Be Missed in 2019

Each year there are countless conferences and events focused on healthcare management and technology, but with so many options, it can be difficult to pick the right ones for your specific...

Emerging MedTech Trends to Keep an Eye On In 2019

Subject to stringent regulatory regimes with considerable legacy complications hindering new infrastructure, technology, or processes — most hospitals are also saddled with significant...

How Leading Endpoint Security Tools Cover Hospitals

Medical devices are often the weak point in a hospital’s technology landscape and, if compromised, could affect patient privacy, health, and safety. 

Obstacles on the Path to Comprehensive IoMT Security

Use of the Internet of Medical Things (IoMT) in hospitals is growing. IP addressable medical technologies help deliver personalized care more quickly, give healthcare professionals access to...

Why Are More Robust Medical Cybersecurity Measures Even Needed?

It seems that every day we hear about the need for more and better medical cybersecurity measures, but why? We don’t hear about the need for retailers to improve shoplifting prevention mechanisms....

Leveraging Machine Learning to Automate Medical Device Insights

Machine learning is totally transforming the healthcare industry; from how patient care is delivered, to how laboratory procedures are conducted, to diagnostics, all the way to how information...

Better Passwords Key to Bridging the Medical Data Security Gap

By now, most of us are familiar with the “WannaCry” ransomware attack. This attack exploited a weakness in Microsoft's Windows operating system to encrypt files and render computers useless until...

Dealing with Cybersecurity Issues in Healthcare: Tips & Tricks

I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways. These connections include...

Anatomy of an ICS-CERT Advisory: How Zero-Days are Disclosed

CyberMDX made news when its research and analysis team identified and responsibly disclosed two serious and hitherto unknown medical device vulnerabilities.

Medical Device Industry Challenges: Beyond the Bleeding Edge

Directed by Oscar-nominated filmmakers Kirby Dick and Amy Ziering, the new Netflix documentary, The Bleeding Edge, profiles five people who suffered horrendously when the medical devices on which...

Why Cybersecurity Should Concern Every Hospital CEO

Medical devices can be your best asset and your worst nightmare. X-ray machines, defibrillators, and other medical electronics are life-saving technologies, but they can also be easily hacked if...

How to Digitally Secure Fast-Changing Health Technologies

Cybercrime is nuanced, and while most medical facilities think they are secure, undiscovered security gaps are being exploited every day. And, it’s not always easy to detect a breach.

Tough Security Questions Hospital CISOs Must Be Able to Answer

Your CISO has a big job: develop network security processes and procedures, while addressing privacy, confidentiality and compliance standards, while investigating and managing health information...

Introducing the CyberMDX Blog

You cannot secure what you do not see. How do you know that there is not a malicious file embedded within this text if you don't even know that the text is here? To achieve comprehensive...

MOST READ POSTS

MOST RECENT POSTS

POSTS BY TAGS


──────
Give a Little Love and It All Comes Back to You!

healthcare-industry-report