Beyond BYOx The Internet of Things in Healthcare

BYOx (Bring Your Own device, data, app, etc.) has become ubiquitous in healthcare settings and offers significant challenges in the areas of security, application migration and device management. Our expert panel will discuss how BYOx has affected healthcare, and strategies organizations are adopting to manage this trend. We will also explore how today's implementation of a scalable BYOx strategy can prepare healthcare organizations for the future of connected devices or "The Internet of Things."

Spotlight

Particle

At Particle, we make tools for engineers and designers to create amazing new experiences through internet-connected hardware. We offer a suite of hardware and software tools to help you prototype, scale, and manage your Internet of Things products.

OTHER ARTICLES
Industrial IoT, IoT Security

How to Secure Your Network with Zero Trust Security for IoT?

Article | July 12, 2023

The concept of "never trust, always verify" is the foundation of the relatively new security architecture known as "zero trust." Zero trust requires that all users and devices be verified every time they connect, even from inside the "moat," in contrast to the conventional castle-and-moat security architecture, which automatically trusts users and devices located within a network's perimeter. Companies are being forced to reconsider how they safeguard their networks by the internet of things (IoT). Unmanaged smart gadgets connected to the internet expand the number of potential access points for hackers to compromise your security when they are added to a network. Zero Trust Security Expansion for IoT After establishing it for users and their devices, organizations must extend zero-trust security to cover unmanaged, non-user devices too. To do this, they require zero trust identity management technologies that automatically register devices, issue credentials, and offer password-less authentication. Device Visibility A device may be infected with malware or have a security breach if performance problems or bugs start to appear frequently. In addition, a malfunctioning device may be more vulnerable to attack. Therefore, organizations require device health monitoring that can automatically identify problems and flag them for remedy in order to establish and maintain zero trust security for IoT. Some cutting-edge solutions can also automatically prevent an impacted device from making further connection attempts or carrying out corrective actions without requiring human participation. The Principle of Least Privilege (PoLP) The principle of least privilege (PoLP), which argues that any user or device should only obtain the bare minimum access privileges necessary to perform their job functions, is widely used in conjunction with zero trust security. Therefore, organizations must establish the minimal level of network access required for each device to carry out its functions before limiting its potential privileges in order to deploy PoLP for IoT. Implementing identity and access management (IAM) tools and guidelines that support zero trust and PoLP for devices is one approach to accomplishing this. Security Monitoring There are other zero-trust security monitoring programs created especially for IoT, such as Palo Alto Networks' IoT Security, which was previously discussed. Businesses can also utilize tools to monitor devices and network traffic, such as next-generation firewalls and intrusion detection and prevention systems (IDS/IPS). The zero trust security solution for IoT must include monitoring in addition to as much automation as possible so that threats can be identified, contained, and remedied even when no one is there to press a button or disconnect a device manually. One of the leading causes of zero trust security projects failing over time is that people stop adhering to them once they get complicated. This is especially true for IoT security that operates on zero trust. In addition, it can be logistically challenging to keep remote, unmanaged devices at zero trust.

Read More
Security, IoT Security

Driving Rapid and Continuous Value for IoT Through an Ecosystem Approach

Article | July 13, 2023

In the wake of the COVID-19 pandemic, manufacturing is roaring back to life, and with it comes a renewed focus on Digital Transformation initiatives. The industry stands on the doorstep of its much-anticipated renaissance, and it’s clear that manufacturing leaders need to not only embrace but accelerate innovation while managing critical processes like increasing capacity while maintaining product quality. Effective collaboration will be key to doing both well, but it’s even more critical as workforces have gone and are still largely remote. As the virus swept the globe, it became apparent quickly that there would be winners and losers. Many manufacturers were caught off-guard, so to speak. Before manufacturing’s aforementioned reckoning, the industry had already been notorious for its slow adoption of the digital, data-centric mindset that has transformed other industries.

Read More
Enterprise Iot

Overcoming IoT Security Challenges for Safe Implementation

Article | May 11, 2023

Explore the IoT security solutions for critical issues and proactive solutions for the safe implementation of connected devices. Delve into cross-domain interactions for secure data storage. Contents 1. Introduction 1.1 Significance of IoT Security for Safe Implementation 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments 2.2 Importance of Proactive Security Measures 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions 3.2 Denial of Service (DoS) Attacks 3.3 Insecure Interfaces and APIs 3.4 Vulnerable Third-Party Components 3.5 Safeguarding Data Storage and Retention 4. Solutions to Prevent Threats 4.1 Secure Integration and Communication 4.2 Traffic Monitoring and Analysis 4.3 Robust Authentication and Authorization Protocols 4.4 Patch Management and Vulnerability Monitoring 4.5 Access Control and User Authentication 5 Conclusion 1. Introduction 1.1 Significance of IoT Security for Safe Implementation The significance of IoT connectivity and security for safe implementation is paramount in today's interconnected world. Some essential points highlight its importance at both the business and advanced levels. IoT devices collect and transmit vast amounts of sensitive data. Without proper security measures, this data can be intercepted, leading to breaches of privacy and potential misuse of personal or corporate information. Implementing robust IoT security ensures the protection of data throughout its lifecycle. Safeguarding Critical Infrastructure is crucial as Many IoT deployments are integrated into critical infrastructure systems such as power grids, transportation networks, and healthcare facilities. A breach in the security of these interconnected systems can have severe consequences, including disruption of services, financial losses, and even threats to public safety. IoT security helps mitigate these risks by preventing unauthorized access and potential attacks. Mitigating financial losses, ensuring operational continuity and preventing IoT botnets and DDoS attacks contribute to security as IoT devices are often integrated into complex ecosystems, supporting various business operations. In recent years, compromised IoT devices have been used to create massive botnets for launching distributed denial-of-service (DDoS) attacks. These attacks can overwhelm networks and cause significant disruptions, affecting the targeted businesses and the internet infrastructure as a whole. Robust IoT security measures, such as strong authentication and regular device updates, can help prevent these attacks. 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments Botnets and DDoS Attacks Botnets, consisting of compromised IoT devices, can be leveraged to launch massive distributed denial-of-service (DDoS) attacks. These attacks overwhelm networks, rendering them inaccessible and causing disruptions to critical services. Inadequate Authentication and Authorization Weak or non-existent authentication and authorization mechanisms in IoT devices can allow unauthorized access to sensitive data or control of connected systems. This can lead to unauthorized manipulation, data breaches, and privacy violations. Firmware and Software Vulnerabilities IoT devices often rely on firmware and software components that may contain vulnerabilities. Attackers can exploit these weaknesses to gain unauthorized access, execute malicious code, or extract sensitive information. Lack of Encryption and Data Integrity Insufficient or absent encryption mechanisms in IoT communications can expose sensitive data to interception and tampering. Without data integrity safeguards, malicious actors can modify data transmitted between devices, compromising the integrity and reliability of the system. Physical Attacks and Tampering IoT devices deployed in public or accessible locations are vulnerable to physical attacks. These attacks include tampering, theft, or destruction of devices, which can disrupt services, compromise data, or manipulate the functioning of the IoT ecosystem. Insider Threats Insiders with authorized access to IoT systems, such as employees or contractors, may abuse their privileges or inadvertently introduce vulnerabilities. This can include unauthorized access to sensitive data, intentional manipulation of systems, or unintentional actions compromising security. Supply Chain Risks The complex and global nature of IoT device supply chains introduces potential risks. Malicious actors can exploit vulnerabilities in the manufacturing or distribution process, implanting backdoors or tampering with devices before they reach end-users. 2.2 Importance of Proactive Security Measures Security measures are vital for ensuring the safety and reliability of IoT environments. Organizations can mitigate risks and stay ahead of potential vulnerabilities and threats by taking a proactive approach. These measures include conducting regular vulnerability assessments, implementing robust monitoring and detection systems, and practicing incident response preparedness. Proactive security measures also promote a 'Security by Design' approach, integrating security controls from the outset of IoT development. Compliance with regulations, safeguarding data privacy, and achieving long-term cost savings are additional benefits of proactive security. Being proactive enables organizations to minimize the impact of security incidents, protect sensitive data, and maintain their IoT systems' secure and reliable operation. 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions Cross-domain interactions refer to the communication and interaction between IoT devices, systems, or networks that operate in different domains or environments. These interactions occur when IoT devices need to connect and exchange data with external systems, platforms, or networks beyond their immediate domain. Incompatibilities in protocols, communication standards, or authentication mechanisms can create vulnerabilities and potential entry points for attackers. 3.2 Denial of Service (DoS) Attacks Denial of Service attacks are malicious activities aimed at disrupting or rendering a target system, network, or service unavailable to its intended users. In a DoS attack, the attacker overwhelms the targeted infrastructure with an excessive amount of traffic or resource requests, causing a significant degradation in performance or a complete service outage. Protecting IoT devices and networks from DoS attacks that aim to disrupt their normal operation by overwhelming them with excessive traffic or resource requests becomes challenging. The issue here lies in distinguishing legitimate traffic from malicious traffic, as attackers constantly evolve their techniques. 3.3 Insecure Interfaces and APIs Insecure interfaces and application programming interfaces (APIs) refer to vulnerabilities or weaknesses in the interfaces and APIs used by IoT devices for communication and data exchange. An interface is a point of interaction between different components or systems, while an API allows applications to communicate with each other. Insecure interfaces and APIs can be exploited by attackers to gain unauthorized access to IoT devices or intercept sensitive data. Ensuring secure authentication and authorization mechanisms, proper encryption of data in transit, and secure storage of API keys and credentials, thus, becomes a challenge. 3.4 Vulnerable Third-Party Components Vulnerable third-party components refer to software, libraries, frameworks, or modules developed and maintained by external parties and integrated into IoT devices or systems. These components may contain security vulnerabilities that attackers can exploit to gain unauthorized access, manipulate data, or compromise the overall security of the IoT ecosystem. Pain points arise from the challenge of assessing the security of third-party components, as organizations may have limited visibility into their development processes or dependencies. 3.5 Safeguarding Data Storage and Retention Data storage and retention refers to the management and security of data collected and generated by IoT devices throughout its lifecycle. Safeguarding stored IoT data throughout its lifecycle, including secure storage, proper data retention policies, and protection against unauthorized access or data leakage, poses a threat. Ensuring secure storage infrastructure, protecting data at rest and in transit, and defining appropriate data retention policies include safeguarding data and maintaining the privacy of stored data. Failure to implementing strong encryption, access controls, and monitoring mechanisms to protect stored IoT data leads to this issue. 4. Solutions to Prevent Threatsc 4.1 Secure Integration and Communication Implement secure communication protocols, such as transport layer security (TLS) or virtual private networks (VPNs), to ensure encrypted and authenticated communication between IoT devices and external systems. Regularly assess and monitor the security posture of third-party integrations and cloud services to identify and mitigate potential vulnerabilities. Organizations need to invest time and resources in thoroughly understanding and implementing secure integration practices to mitigate the risks associated with cross-domain interactions. 4.2 Traffic Monitoring and Analysis Deploy network traffic monitoring and filtering mechanisms to detect and block suspicious traffic patterns. Implement rate limiting, traffic shaping, or access control measures to prevent excessive requests from overwhelming IoT devices. Utilize distributed denial of service (DDoS) mitigation services or hardware appliances to handle volumetric attacks. Organizations must deploy robust traffic analysis and anomaly detection mechanisms to identify and mitigate DoS attacks promptly. Additionally, scaling infrastructure and implementing load-balancing mechanisms become essential to handle sudden surges in traffic during an attack. 4.3 Robust Authentication and Authorization Protocols Apply secure coding practices and implement strong authentication and authorization mechanisms for interfaces and APIs. Utilize secure communication protocols (e.g., HTTPS) and enforce strict access controls to prevent unauthorized access. Regularly update and patch interfaces and APIs to address any known vulnerabilities. Organizations must conduct regular security audits of their interfaces and APIs, implement strong access controls, and regularly update and patch vulnerabilities to address these effectively. 4.4 Patch Management and Vulnerability Monitoring Conduct thorough security assessments of third-party components before integration, verifying their security track record and ensuring they are regularly updated with security patches. Establish a process for monitoring and addressing vulnerabilities in third-party components, including timely patching or replacement. Establishing strict vendor evaluation criteria, conducting regular security assessments, and maintaining an up-to-date inventory of third-party components can help address these issues and mitigate the risks associated with vulnerable components. 4.5 Access Control and User Authentication Encrypt stored IoT data to protect it from unauthorized access or leakage. Implement access controls and user authentication mechanisms to restrict data access based on role or privilege. Establish data retention policies that comply with relevant regulations and securely dispose of data when no longer needed. Clear data retention policies should be established, specifying how long data should be stored and when it should be securely deleted or anonymized to minimize data leakage risks. It's important to note that these solutions should be tailored to specific organizational requirements and constantly evaluated and updated as new threats and vulnerabilities emerge in the IoT security landscape. 5. Conclusion Ensuring the safe implementation of IoT requires overcoming various security challenges through proactive measures and a comprehensive approach. By implementing proactive security measures, organizations can mitigate risks and maintain the safety and reliability of IoT environments. Overcoming these challenges requires organizations to invest in certain integration practices, traffic analysis, authentication mechanisms, encryption protocols, and vendor evaluation criteria. Overcoming IoT security challenges for safe implementation necessitates a proactive and comprehensive approach encompassing vulnerability management, monitoring and detection, incident response preparedness, secure design practices, compliance with regulations, and robust data storage and retention mechanisms. The emergence in IoT security encompasses the incorporation of machine learning and AI for improved threat detection, the application of blockchain for secure transactions and device authentication, the integration of security measures at the edge through edge computing, the establishment of standardized protocols and regulatory frameworks, the adoption of advanced authentication methods, and the automation of security processes for efficient IoT security management. These trends aim to address evolving risks, safeguard data integrity and privacy, and enable IoT systems' safe and secure implementation.

Read More
Enterprise Iot

Practical IoT Data Processing & Management for Businesses

Article | August 10, 2022

IoT has undeniably become the massive growth propellant for modern-day business. Enterprises employ intelligent systems to improve production in factories, and reduce costs, build industrial automation systems to replace human assignments, monitor and reduce energy; and develop autonomous transportation to enhance driver safety. Inside these embedded systems are sensors that rapidly transmit data that must be immediately captured, processed, and acted upon. Traditional embedded database solutions don't understand and meet the complex needs of IoT devices when it comes to processing and managing data. IoT edge database solutions that can understand the constant data stream from sensors enable devices to make crucial decisions in milliseconds. Real-time Edge Data Processing Enterprisers and business owners prefer scalable edge data management solutions to deploy hundreds of IoT devices so that each device can manage, collect, and analyze the massive amounts of data these IoT sensors produce without losing performance. These devices must capture and store critical information so that the IoT node can make independent decisions and trigger appropriate reactions. Database queries allow device apps to get the information they need to make intelligent decisions in real-time, quickly and without wasting time. To be successful in the IoT, you need the right data management software and the ability to quickly collect and connect device data rapidly to get low latency. IoT Data Processing and Management Standard data management solutions do not fully address the complexity of architecting software for IoT data processing. Despite being the primary data source, sensors are often constrained by their limitations and fail to provide sophisticated analysis. The focus of IoT data analysis and management is to harvest real-time information and make sense of it quickly. A good solution uses technologies that many developers are already familiar with, like SQL, to solve the new problem of analyzing IoT sensors directly on edge devices. Conclusion While building a device application, at every stage, developers must make tough calls to select the best data management and database software to launch their edge-centric IoT systems. Such costly decisions consume significant development and validation time as well. Using existing IoT data management platforms is a better way to deal with scaling, security, and the weight of data. Businesses can set up, connect, and grow their IoT infrastructure with these platforms. Organizations don't have to build their own IoT infrastructure from scratch. Instead, they can use IoT platforms that give them access to IoT devices, cloud infrastructure, and networks worldwide. Small and medium-sized businesses may find this method saves money.

Read More

Spotlight

Particle

At Particle, we make tools for engineers and designers to create amazing new experiences through internet-connected hardware. We offer a suite of hardware and software tools to help you prototype, scale, and manage your Internet of Things products.

Related News

Devices, Industrial IoT

Armis Identifies the Riskiest Medical and IoT Devices in Clinical Environments

Businesswire | April 18, 2023

Armis, the leading asset visibility and security company, today released new research identifying the top connected medical and IoT devices that are exposed to malicious activity in clinical environments. Data analyzed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found nurse call systems to be the riskiest* IoMT device, followed by infusion pumps and medication dispensing systems. When looking at IoT devices, IP cameras, printers and Voice Over Internet Protocol (VoIP) devices are topping the list. By 2026, smart hospitals are expected to deploy over 7 million IoMT devices, doubling the amount from 2021. Medical and non-medical devices are increasingly connected, automatically feeding patient data from monitoring devices into electronic records. These connections and communications within a medical environment help improve patient care but also make it increasingly vulnerable to cyberattacks, which could result in the interruption of patient care. Upon a comprehensive analysis of the data from all connected medical and IoT devices on the Armis Asset Intelligence and Security Platform, several noteworthy conclusions can be drawn Nurse call systems are the riskiest connected medical device, with 39% of them having critical severity unpatched Common Vulnerabilities and Exposures (CVEs) and almost half (48%) having unpatched CVEs. Infusion pumps are second, with 27% having critical severity unpatched CVEs and 30% having unpatched CVEs. Medication dispensing systems are in third place, with 4% having critical severity unpatched CVEs, but 86% having unpatched CVEs. Moreover, 32% run on unsupported Windows versions. Almost 1 in 5 (19%) connected medical devices are running unsupported OS versions. More than half of IP cameras we monitored in clinical environments have critical severity unpatched CVEs (56%) and unpatched CVEs (59%), making it the riskiest IoT device. Printers are the second riskiest IoT device in clinical environments, with 37% having unpatched CVEs, and 30% having critical severity unpatched CVEs. VoIP devices are in third place. Although 53% of them have unpatched CVEs, only 2% have critical severityunpatched CVEs. “These numbers are a strong indicator of the challenges faced by healthcare organizations globally. Advances in technology are essential to improve the speed and quality of care delivery as the industry is challenged with a shortage of care providers, but with increasingly connected care comes a bigger attack surface,” said Mohammad Waqas, Principal Solutions Architect for Healthcare at Armis. “Protecting every type of connected device, medical, IoT, even the building management systems, with full visibility and continuous contextualized monitoring is a key element to ensuring patient safety.” Armis secures all medical assets and patient care environments in some of the largest healthcare delivery organizations around the world: “Armis appeared to be a good alternative for us because it immediately provided us with visibility into what devices were plugging into the network. It shows us how they are interacting with each other, creates alerts based on observed behavior and enforces firewall rules based on those alerts,” said Brian Schultz, Director of Network Operations and Security, Burke Rehabilitation Hospital. “Metrics and accountability are key to understanding how to protect the hospital’s network, and Armis has a major role in making the relevant data available to us in an easy-to-access manner. It has definitely filled in the gaps in our security arsenal by uncovering risks we never knew about previously. At first, I thought Armis was a nice-to-have, but now it’s become an integral part of our cyber defense,” said Dr. Michael Connolly, Chief Information Officer (CIO), Mater Misericordiae University Hospital. KLAS Research recently named Armis a top performer at the 2023 Best in KLAS Software & Services Report for Healthcare IoT Security. To learn more about how Armis enables healthcare organizations to identify and secure IoMT, IoT, OT and IT assets Armis is attending HIMSS April 17-21, 2023 in Chicago, IL with a speaking session taking place on Wednesday, April 19, 2023 from 3:45pm - 4:05pm CT titled: Hackers Rush in Where Agents Fear to Tread. To meet with Armis at HIMSS, please visit booth 2276 or Kiosk 4309-48 in the Cyber Command Center. About Armis Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.

Read More

Forescout partners with Medigate to reduce medical IoT device risk

Healthcare IT News | March 06, 2020

IoT security company Forescout has entered a strategic partnership with Medigate, a medical-device security and asset-management company, to help healthcare organizations continuously discover, identify, assess and secure all Internet of Medical Things (IoMT), IoT, operational technology (OT) and IT network connected devices.Through this new collaboration, the companies have developed an integration to bring together Medigate's in-depth IoMT visibility, anomaly detection and lifecycle-management capabilities with Forescout’s enterprise-device visibility, automated segmentation and incident-response capabilities. Forescout will also resell the Medigate Platform. The joint offering will utilize passive technologies to identify and classify all connected medical devices and IT assets on health delivery organization networks, including unknown and hard-to-classify devices, while minimizing disruption. It will provide valuable insights to support corporate security policies to protect biomedical devices through effective vulnerability management, anomaly and threat detection, and risk scoring.

Read More

IoT security and the psychology of supplier apathy

Healthcare IT news | January 29, 2020

Warnings about IoT vulnerabilities have resounded across 2020 cybersecurity predictions, but the greatest vulnerability of all is apathy. This charge can potentially be applied to anyone and everyone from healthcare providers to government agencies. What I want to focus on, however, is the supplier community. I increasingly talk to CIOs and CISOs that express a frustration with the behaviour of their suppliers. It seems that many are ambiguous about proactively addressing regulatory standards that are specific to preserving patient safety. As the leaders I talk to often point out to me – it would be a competitive advantage if they did (let alone be ethical). This all applies especially to IoT devices, what with increasing interoperability, mobility and the dawn of 5G where the scope for system failures that could affect patient care are greater than ever.

Read More

Devices, Industrial IoT

Armis Identifies the Riskiest Medical and IoT Devices in Clinical Environments

Businesswire | April 18, 2023

Armis, the leading asset visibility and security company, today released new research identifying the top connected medical and IoT devices that are exposed to malicious activity in clinical environments. Data analyzed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found nurse call systems to be the riskiest* IoMT device, followed by infusion pumps and medication dispensing systems. When looking at IoT devices, IP cameras, printers and Voice Over Internet Protocol (VoIP) devices are topping the list. By 2026, smart hospitals are expected to deploy over 7 million IoMT devices, doubling the amount from 2021. Medical and non-medical devices are increasingly connected, automatically feeding patient data from monitoring devices into electronic records. These connections and communications within a medical environment help improve patient care but also make it increasingly vulnerable to cyberattacks, which could result in the interruption of patient care. Upon a comprehensive analysis of the data from all connected medical and IoT devices on the Armis Asset Intelligence and Security Platform, several noteworthy conclusions can be drawn Nurse call systems are the riskiest connected medical device, with 39% of them having critical severity unpatched Common Vulnerabilities and Exposures (CVEs) and almost half (48%) having unpatched CVEs. Infusion pumps are second, with 27% having critical severity unpatched CVEs and 30% having unpatched CVEs. Medication dispensing systems are in third place, with 4% having critical severity unpatched CVEs, but 86% having unpatched CVEs. Moreover, 32% run on unsupported Windows versions. Almost 1 in 5 (19%) connected medical devices are running unsupported OS versions. More than half of IP cameras we monitored in clinical environments have critical severity unpatched CVEs (56%) and unpatched CVEs (59%), making it the riskiest IoT device. Printers are the second riskiest IoT device in clinical environments, with 37% having unpatched CVEs, and 30% having critical severity unpatched CVEs. VoIP devices are in third place. Although 53% of them have unpatched CVEs, only 2% have critical severityunpatched CVEs. “These numbers are a strong indicator of the challenges faced by healthcare organizations globally. Advances in technology are essential to improve the speed and quality of care delivery as the industry is challenged with a shortage of care providers, but with increasingly connected care comes a bigger attack surface,” said Mohammad Waqas, Principal Solutions Architect for Healthcare at Armis. “Protecting every type of connected device, medical, IoT, even the building management systems, with full visibility and continuous contextualized monitoring is a key element to ensuring patient safety.” Armis secures all medical assets and patient care environments in some of the largest healthcare delivery organizations around the world: “Armis appeared to be a good alternative for us because it immediately provided us with visibility into what devices were plugging into the network. It shows us how they are interacting with each other, creates alerts based on observed behavior and enforces firewall rules based on those alerts,” said Brian Schultz, Director of Network Operations and Security, Burke Rehabilitation Hospital. “Metrics and accountability are key to understanding how to protect the hospital’s network, and Armis has a major role in making the relevant data available to us in an easy-to-access manner. It has definitely filled in the gaps in our security arsenal by uncovering risks we never knew about previously. At first, I thought Armis was a nice-to-have, but now it’s become an integral part of our cyber defense,” said Dr. Michael Connolly, Chief Information Officer (CIO), Mater Misericordiae University Hospital. KLAS Research recently named Armis a top performer at the 2023 Best in KLAS Software & Services Report for Healthcare IoT Security. To learn more about how Armis enables healthcare organizations to identify and secure IoMT, IoT, OT and IT assets Armis is attending HIMSS April 17-21, 2023 in Chicago, IL with a speaking session taking place on Wednesday, April 19, 2023 from 3:45pm - 4:05pm CT titled: Hackers Rush in Where Agents Fear to Tread. To meet with Armis at HIMSS, please visit booth 2276 or Kiosk 4309-48 in the Cyber Command Center. About Armis Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.

Read More

Forescout partners with Medigate to reduce medical IoT device risk

Healthcare IT News | March 06, 2020

IoT security company Forescout has entered a strategic partnership with Medigate, a medical-device security and asset-management company, to help healthcare organizations continuously discover, identify, assess and secure all Internet of Medical Things (IoMT), IoT, operational technology (OT) and IT network connected devices.Through this new collaboration, the companies have developed an integration to bring together Medigate's in-depth IoMT visibility, anomaly detection and lifecycle-management capabilities with Forescout’s enterprise-device visibility, automated segmentation and incident-response capabilities. Forescout will also resell the Medigate Platform. The joint offering will utilize passive technologies to identify and classify all connected medical devices and IT assets on health delivery organization networks, including unknown and hard-to-classify devices, while minimizing disruption. It will provide valuable insights to support corporate security policies to protect biomedical devices through effective vulnerability management, anomaly and threat detection, and risk scoring.

Read More

IoT security and the psychology of supplier apathy

Healthcare IT news | January 29, 2020

Warnings about IoT vulnerabilities have resounded across 2020 cybersecurity predictions, but the greatest vulnerability of all is apathy. This charge can potentially be applied to anyone and everyone from healthcare providers to government agencies. What I want to focus on, however, is the supplier community. I increasingly talk to CIOs and CISOs that express a frustration with the behaviour of their suppliers. It seems that many are ambiguous about proactively addressing regulatory standards that are specific to preserving patient safety. As the leaders I talk to often point out to me – it would be a competitive advantage if they did (let alone be ethical). This all applies especially to IoT devices, what with increasing interoperability, mobility and the dawn of 5G where the scope for system failures that could affect patient care are greater than ever.

Read More

Events