Manage Learn to apply best practices and optimize your operations.

Hospital IT departments fight to keep healthcare BYOD safe

Healthcare technology has advanced to the point where mobile medical devices can reliably monitor patients, but their wider implementation will have to wait until security technology catches up.

Securing every endpoint where hospital staff access medical information remains one of the top priorities for every...

hospital IT department. Deploying software to assist in monitoring employees' devices has made this task more manageable.

But as more healthcare BYOD initiatives are introduced, IT needs to reassess its processes and procedures to ensure a high level of protection against data breaches. Most IT departments' existing processes to secure patient data are being threatened by the complex devices that are entering their hospital facilities.

Medical devices also vulnerable

Wireless insulin pumps, wireless vital monitoring devices, pacemakers and artificial pancreases are but a few of the devices that can pose a significant health risk if they are compromised. Data breaches take a back seat to security threats that affect the functionality of any of these medical devices. There are no common security tools that can be deployed to protect these new and complex products.

As hospitals become more dependent on medical devices and install healthcare BYOD policies to help remotely capture and transmit health data, increased risk will be the reality.

At Black Hat 2011, an insulin pump was compromised by a security expert. He was able to remotely control the medical device through a controlled hack. This type of attack can be a nightmare for hospitals, manufacturers and patients. Traditionally, IT can address vulnerabilities within devices by updating their firmware or by deploying antivirus or antimalware software to keep them from being infected. Unfortunately, IT is unlikely to do house calls to update an implantable medical device. This poses a serious challenge for hospitals. They will need to address the security risks of many of these devices before purchasing them.

Another area of concern for hospitals is how to secure data transmitted from medical devices. Some of these transmissions hold critical health information that could lead to serious consequences if intercepted and modified.

Not just a HIPAA concern

Some of these concerns go beyond HIPAA compliance. They are serious enough that they would need to be addressed by providers, medical device manufacturers and IT security experts. To calm their fears and educate their staff, providers must work with vendors to define all security best practices. Providers must also be aware of how all of their devices work to protect patient data during transfer and while at rest.

As hospitals become more dependent on medical devices and install healthcare BYOD policies to help remotely capture and transmit health data, increased risk will be the reality. In fact, it may end up being IT's biggest security challenge.

At Black Hat 2014, attendees learned how to combat all the latest security threats. While some may have taken it as an opportunity to learn new hacking tricks, healthcare cybersecurity experts hopefully learned a few lessons about how to better protect health information, regardless of where it is.

About the author:
Reda Chouffani is vice president of development at Biz Technology Solutions Inc., which provides software design, development and deployment services for the healthcare industry. Let us know what you think about the story; email
 editor@searchhealthit.com or contact @SearchHealthIT on Twitter.

Next Steps

Tips to maintain a safe healthcare BYOD program

AHIMA presenter calls for BYOD innovation

A proper BYOD implementation should simplify healthcare

This was last published in September 2014

Dig Deeper on Mobile health systems and devices

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCompliance

SearchCIO

SearchCloudComputing

SearchMobileComputing

SearchSecurity

SearchStorage

Close