{"id":592878,"date":"2023-01-01T05:50:31","date_gmt":"2023-01-01T11:50:31","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/01\/government-inaction-adds-pressure-to-iomt-device-and-data-security\/"},"modified":"2023-01-01T05:50:31","modified_gmt":"2023-01-01T11:50:31","slug":"government-inaction-adds-pressure-to-iomt-device-and-data-security","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/01\/government-inaction-adds-pressure-to-iomt-device-and-data-security\/","title":{"rendered":"Government inaction adds pressure to IoMT device and data security"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2022-12-31T19:10:00+00:00\" datetime=\"2022-12-31T19:10:00+00:00\">December 31, 2022 11:10 AM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2021\/10\/GettyImages-1251551602-e1634921639991.jpg?fit=750%2C500&#038;strip=all\" alt=\"Asia woman wearing surgical mask on face protective for spreading of disease Covid-19 pandemic Coronavirus. Young Adult Asian using laptop while sitting on sofa with virtual graphic icon diagram.\"><\/p>\n<div>\n<p><em>Image Credit:  Poomsak Thammasermsakul \/\/ Getty Images<\/em><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2835178\">\n<div>\n<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>It\u2019s now become an unfortunate reality that U.S. hospital systems and other healthcare delivery organizations must look solely to their own leadership on Internet of Medical Things <a href=\"https:\/\/venturebeat.com\/ai\/elder-care-wireless-ai-and-the-internet-of-medical-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">(IoMT)<\/a> device and data security, as new legislation won\u2019t be doing them any favors. With vulnerable IoMT devices a particularly popular pathway for ransomware and malware, the government\u2019s relative inaction is worrisome.<\/p>\n<h2>Healthcare security legislation, watered down<\/h2>\n<p>Many hospitals have championed the inclusion of medical device security provisions in this year\u2019s appropriations bill responsible for funding the U.S. Food and Drug Administration (FDA) and reauthorizing FDA user fee programs. <\/p>\n<p>In June, a version of the bill that would have placed new legally binding security requirements on IoMT device manufacturers easily passed in the House of Representatives. That bill would have \u2014 and should have \u2014 held manufacturers responsible for assessing the cybersecurity of their internet-connected devices <em>before<\/em> bringing them to market. It would also have required them to provide a software bill of materials (<a href=\"https:\/\/venturebeat.com\/security\/why-cisos-need-to-make-software-bills-of-materials-sboms-a-top-priority-in-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">SBOM<\/a>) for transparency and greater security insights into device software components and vulnerabilities.<\/p>\n<p>However, those device security provisions were <a href=\"https:\/\/www.scmagazine.com\/analysis\/device-security\/fda-bill-passes-without-cybersecurity-requirements-for-medical-devices\" target=\"_blank\" rel=\"noreferrer noopener\">stripped out<\/a> of the version of the bill that passed at the end of September, as FDA funding was set to expire and disappointing compromises were carried out against the clock.<\/p>\n<p><html><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<h2 id=\"h-the-patch-act\">The PATCH Act<\/h2>\n<p>Hope isn\u2019t lost for IoMT security requirements at the federal level. Introduced in March, the Protecting and Transforming Cyber Health Care <a href=\"https:\/\/www.cassidy.senate.gov\/newsroom\/press-releases\/cassidy-baldwin-introduce-bill-to-secure-health-care-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">(PATCH) Act<\/a> would impose similar requirements. Device manufacturers would have to demonstrate cybersecurity precautions to the FDA before going to market; provide transparent SBOMs; and deliver timely device security updates throughout their products\u2019 lifecycles. <\/p>\n<p>In June, the PATCH Act was endorsed by the <a href=\"https:\/\/www.aha.org\/lettercomment\/2022-06-24-aha-letter-senate-regarding-support-patch-act\" target=\"_blank\" rel=\"noreferrer noopener\">American Hospital Association<\/a>, which represents nearly 5,000 healthcare delivery organizations and millions of healthcare professionals.<\/p>\n<p>While medical device security proponents rightfully view the watered-down FDA appropriations bill as a frustrating missed opportunity, efforts such as the PATCH Act and others that enforce security at the manufacturer level will certainly continue.<\/p>\n<p>But attackers aren\u2019t waiting patiently while lawmakers get their act together (whether it\u2019s PATCH or another measure). They are continuing to launch daily attacks on IoMT devices rife with <a href=\"https:\/\/venturebeat.com\/2022\/05\/01\/5-key-industries-in-need-of-iot-security\/\">vulnerabilities<\/a>. With the government cavalry not coming to the rescue, the industry needs to rely on its own wherewithal to secure its internet-connected devices and systems as effectively as possible.<\/p>\n<h2 id=\"h-healthcare-security-faces-daunting-iomt-challenges\">Healthcare security faces daunting IoMT challenges <\/h2>\n<p>Healthcare security teams are up against challenging limits. The industry largely depends on especially heterogeneous fleets of medical devices, with technology implementations ranging from the state-of-the-art to the woefully outdated. Traditional device security scanning to detect threats is often inapplicable because such scans will crash legacy devices.<\/p>\n<p>Among the IoMT devices increasingly ubiquitous in many healthcare delivery environments, device manufacturers publish 2,000 to 3,000 vulnerabilities in an average month. But publishing vulnerabilities is one thing; actually patching them is another story. Even the most dutiful manufacturers patch just one in 50 of those vulnerabilities.<\/p>\n<p>Network segmentation isn\u2019t a strong option either since, without frequent maintenance, the addition of new devices inevitably erodes segmentation into a flat network.<\/p>\n<p>The biggest limitation of all is one that distinguishes healthcare security from any other industry: Security teams can\u2019t unilaterally deactivate vulnerable IoMT devices. Instead, they must balance their concerns with clinicians, because devices may be essential to patient experiences; even outcomes.<\/p>\n<p>Security teams can easily exhaust their resources attempting to mitigate every device vulnerability in their environments, without achieving comprehensive results.<\/p>\n<h2>Zeroing in on the true IoMT threats<\/h2>\n<p>That said, there\u2019s a great opportunity for healthcare delivery organizations\u2019 <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> teams to efficiently solve these security issues. According to exploit analysis, 90% of vulnerabilities in a given IoMT environment don\u2019t actually present any risk. <\/p>\n<p>This is because medical device exploits closely depend on the use case and the software components that are used in normal operation. <a href=\"https:\/\/venturebeat.com\/2022\/05\/20\/report-frequency-of-cyberattacks-in-2022-has-increased-by-almost-3m\/\" target=\"_blank\" rel=\"noreferrer noopener\">Attackers<\/a> carefully explore these factors, and will exploit the same vulnerability using different tactics based on what\u2019s possible in a given scenario. Security teams can use the same approach to vastly narrow the battleground they must defend, accurately recognizing their true risks and concentrating resources on addressing the actual threats at hand.<\/p>\n<p>The future of government leadership on enforcing medical device security at the manufacturer level is up in the air, and, realistically, it may remain so for some time. <\/p>\n<p>So, healthcare delivery organizations must seize the initiative to protect their environments from attacks. They must do so by strategically optimizing security practices and prioritizing the true threats among the myriad IoMT device vulnerabilities they have to live with.<\/p>\n<p><em>Shankar Somasundaram is CEO of<\/em><a href=\"https:\/\/asimily.com\/\"><\/a><em> Asimily<\/em><\/p>\n<div id=\"boilerplate_2736392\">\n<h3 id=\"h-datadecisionmakers\">DataDecisionMakers<\/h3>\n<p>Welcome to the VentureBeat community!<\/p>\n<p>DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.<\/p>\n<p>If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.<\/p>\n<p>You might even consider\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/venturebeat.com\/contribute-to-datadecisionmakers\/\">contributing an article<\/a>\u00a0of your own!<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/venturebeat.com\/category\/DataDecisionMakers\/\" target=\"_blank\">Read More From DataDecisionMakers<\/a><\/p>\n<\/div>\n<p>\t\t\t\t<\/html><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/government-inaction-adds-pressure-to-iomt-device-and-data-security\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Shankar Somasundaram, Asimily<\/p>\n","protected":false},"excerpt":{"rendered":"<p>December 31, 2022 11:10 AM Image Credit: Poomsak Thammasermsakul \/\/ Getty Images Check out all the on-demand sessions from the Intelligent Security Summit here. It\u2019s now become an unfortunate reality that U.S. hospital systems and other healthcare delivery organizations must look solely to their own leadership on Internet of Medical Things (IoMT) device and data<\/p>\n","protected":false},"author":1,"featured_media":592879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[284,91500,46],"tags":[],"class_list":{"0":"post-592878","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-government","8":"category-inaction","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/592878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=592878"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/592878\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/592879"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=592878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=592878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=592878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}