Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Nearly 50% of manufacturers don’t test their devices highlighting critical security deficiencies in today’s medical devices

by The Gurus
May 25, 2017
in Editor's News
Share on FacebookShare on Twitter

The latest Synopsys and Ponemon study Medical Device Security: An Industry Under Attack and Unprepared to Defend has been released today and highlights the critical security deficiencies in today’s medical devices.
Alarmingly only 53% of healthcare delivery organisations (HDOs) said they tested the medical device at least once a year with 43% of manufactures said they don’t test devices at all.
“The security of medical devices is truly a life or death issue for both device manufacturers and healthcare delivery organizations,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “According to the findings of the research, attacks on devices are likely and can put patients at risk. Consequently, it is urgent that the medical device industry makes the security of its devices a high priority.”
The survey, which was conducted by the Ponemon Institute, a leading IT security research organisation, reviewed more than 550 individuals from manufacturers and HDOs to identify whether device makers and HDOs are in alignment about the need to address cybersecurity risks.
Unfortunately, it was found 67% of medical device manufactures and 56% of HDOs believe an attack on a medical device built in or in use by their organisations is likely to occur over the next 12 months.
Furthermore, 80% of device makers and HDOs report that building secure devices is becoming increasingly more challenging. The main vulnerabilities in medical devices mainly revolved around coding deficiencies with accidental coding errors, lack of knowledge/training on secure coding practises and pressure on development teams to meet product deadline heighted as the main issues.
Following the industry FDA guidelines also proves to be an obstacle as only 51% of device makers and 44% of HDOs follow current FDA guidance to mitigate of reduce inherent security risks in medical devices.
“These findings underscore the cybersecurity gaps that the healthcare industry desperately needs to address to safeguard the well-being of patients in an increasingly connected and software-driven world,” said Mike Ahmadi, global director of critical systems security for Synopsys’ Software Integrity Group. “As we saw with the past two studies on the Building Security in Maturity Model (BSIMM), the healthcare industry continues to struggle when it comes to software security. The industry needs to undergo a fundamental shift, building security into the software development lifecycle and across the software supply chain to ensure medical devices are not only safe, but also secure.”
To view the full report click here: https://www.synopsys.com/software-integrity/resources/analyst-reports/medical-device-security-report.html

FacebookTweetLinkedIn
Tags: CyberdevicesecurityTechnology
ShareTweetShare
Previous Post

DDoS Attacks Fell 23% in First Quarter, Grew in Size

Next Post

The GDPR: The SME approach to the ‘Right to be Forgotten’

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information