Internet of Medical Things exposes healthcare facilities' security weaknesses

With exposure to the Internet comes risk of hacking, viruses, malware and ransomware


Internet of Medical Things exposes healthcare facilities' security weaknesses, according to an article on the Health IT Management website.

With exposure to the Internet comes risk of hacking, viruses, malware and ransomware.

Although no credible reports exist showing the hacking of medical equipment in an effort to harm patients, the risk exists and worries cybersecurity experts. Previous medical device hacks focused on stealing patient information for financial gain.

Recent infiltrations of healthcare networks through malware worry many provider organizations, yet the resources devoted to cybersecurity lag the needed investment.

Read the article.

 

 



June 29, 2016


Topic Area: Security


Recent Posts

Case Study: How NYU Langone Rebuilt for Resilience After Superstorm Sandy

Although the damage was severe, it provided a valuable opportunity for NYU Langone to assess structural vulnerabilities and increase facility resilience.


Frederick Health Hospital Faces 5 Lawsuits Following Ransomware Attack

The lawsuits accuse FHH of inadequate cybersecurity, poor breach notification and failing to protect patients from identity theft risks.


Arkansas Methodist Medical Center and Baptist Memorial Health Care to Merge

They have signed a non-binding letter of intent to complete a shared mission agreement to merge the two organizations.


Ground Broken on Intermountain Saratoga Springs Multi-Specialty Clinic

The clinic is scheduled to open and start seeing patients in the fall of 2026.


Electrical Fire Tests Resilience of Massachusetts Hospital

Signature Healthcare Brockton Hospital used opportunity to renovate key systems and components and expand facility operations.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.