Get notifications!

The Internet of Medical Things (IoMT) Punctuates a Century of Progress

"When wireless is perfectly applied, the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole.”

Why It’s Wrong to Sync Medical Device Patching & Scheduled Maintenance

Machines are indispensable, yet imperfect. They work fine one day and break down the next. What’s more, even if the machine remains in essentially the same working order, you’ll still need to reconfigure, adjust, reinforce, or add components if its environment is liable to change. 

Everything HDOs Need to Know About URGENT/11

On July 29th, 2019, eleven vulnerabilities affecting the “VxWorks” Real Time Operating System (RTOS) were publicly disclosed. Since these vulnerabilities were all reported by the same source and all deal with VxWorks’ network stack (the software code implementing network communications), they were bundled ...

In Perspective: the Baltimore Hack Attack

The world is a dangerous place. Perhaps it’s always been that way. Nature is governed by evolutionary competition, politics take shape where interests and power meet, and economics are ruled by free markets and comparative advantages. It’s a brutal, cutthroat business. And yet, things seem even more dangerous ...

Why Cybersecurity is Important for Biomedical Engineers

Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day hospital operations. Their responsibilities are wide-ranging and they touch many aspects of modern healthcare, from ...

Load Posts

Why Cybersecurity is Important for Biomedical Engineers

Biomedical engineers are the unseen force behind some of modern medicine's greatest achievements. Biomedical engineers are at the forefront of exciting research and they are staples of day-to-day...

How to Track and Act On Clinical Asset Utilization Insights

HDOs occupy a unique position: on the one hand, their focus is on patient care, and their success is measured by health outcomes. On the other hand, they are businesses, with investors,...

New Anesthesia Machine Vulnerability Disclosure Tells a Bigger Story

For the first time, on July 9, 2019, ICS-CERT disclosed a vulnerability specifically impacting anesthesia machines. If exploited, the vulnerability would allow an attacker to silence alarms, alter...

CVE-2019-10962 & IoT Security Threats From "Innocent" Objects

At one point early on in the beloved C. S. Lewis children’s novel, The Lion, the Witch and the Wardrobe, Mr. Tumnus sets the scene, intimating the stakes involved and explaining his own timidity,...

3 Best Practices to Guide Your Healthcare Automation

The climate for healthcare organizations is a challenging one, with healthcare costs expected to rise by 6.5% over the next year. Between tighter compliance regulations, increased competition, and

Healthcare Network Security: Can’t My NAC Knock Back A HIT Attack?

Unless you’ve been living under a rock for the last 10 years, you’ve heard of the Internet of Things, or IoT as it’s commonly abbreviated. The subset of IoT belonging specifically to healthcare...

Where Medical Equipment Inventory Management & Cybersec Meet

Hospitals have an average of 15 to 20 devices per bed, which means even a comparatively small 100-bed hospital is home to thousands of medical devices, most of which are connected to the hospital...

Top Tips for End of Product Life Health Technology Management

Today’s hospitals are centers of advanced technology, with upwards of several thousand medical devices and clinical assets under their roof. The US is home to 6,210 hospitals, each with 50 to 500...

Cybersecurity: Key to the Hospital Strategic Planning Process

Hospitals operate in a challenging environment: relationships with insurers, state as well as federal rules and regulations, staff shortages, emerging treatments, new clinical technologies, and...

Endpoint Detection & Response: Key to Hospital Network Security

Spurred by competition, razor-thin operating margins, and government regulation, healthcare organizations are under immense pressure to quickly and regularly implement new technologies.

Why Strong Healthcare IoT Security Requires Specialized Solutions

The rush to adopt IoT devices in consumer and business markets is well documented, but the scale of uptake comes at a cost: the increased risk of cyber attack. More connected devices and the...

Cybersecurity 101: Medical Technology Edition

The world is changing; and while there may never have been a time when that statement was not true, it seems particularly true today. Change these days seems to be a lot more aggressive and...

Healthcare Cybersecurity Predictions for 2019

Like most business units at this time of year, biomedical and clinical teams will be reflecting on the last 12 months and trying, as best they can, to figure out what the new year will bring....

Obstacles on the Path to Comprehensive IoMT Security

Use of the Internet of Medical Things (IoMT) in hospitals is growing. IP addressable medical technologies help deliver personalized care more quickly, give healthcare professionals access to...

Dealing with Cybersecurity Issues in Healthcare: Tips & Tricks

I won't sugar coat it. Hospitals are seen by hackers as "soft" and valuable targets. The modern medical facility is connected to the internet in a multitude of ways. These connections include...

MOST READ POSTS

MOST RECENT POSTS

POSTS BY TAGS


──────
Give a Little Love and It All Comes Back to You!

healthcare-industry-report