by Colin Konschak and Shane Danaher
When you imagine medical devices being breached by cybercriminals, your thoughts might automatically go to the horror scenario—a pacemaker being ordered to drive 800 volts into the heart of an unsuspecting politician or an infusion pump being shut off or instructed to deliver a deadly multi-dose administration. While threats like these need to be taken seriously, healthcare IT leaders are looking at bigger picture organizational threats when it comes to medical device breaches, or “medjacking” as it has come to be known.
The bigger picture looks like this: the cybercriminal finds a security vulnerability in a networked imaging machine in a large hospital, letting her into the wi-fi network, eventually providing an entry into the entire network. From there a range of damage could be done, including holding electronic health records hostage, stealing protected health information, shutting the network down, or back to the horror scenario above of causing malfunctions in medical devices hooked up to people, except on a much grander scale.
In this whitepaper we look at the risks of medjacking and identify key elements of management strategies to help mitigate those risks.
Download the full whitepaper – Medjacking: A Life or Death Issue for Leaders in Connected Healthcare.