Feature | Cybersecurity | February 12, 2019 | By Greg Freiherr

The One Step Providers Must Take To Achieve Cybersecurity

Company seeks to make imaging devices less vulnerable

Networked medical devices at a health care provider and their vulnerability to cyber attack, as seen in a screenshot of a display created by the Medigate platform

Networked medical devices at a health care provider and their vulnerability to cyber attack, as seen in a screenshot of a display created by the Medigate platform. Image courtesy of Medigate

Cybersecurity is being defined by a kind of arms race.

On one side are the hackers with malware, some off the shelf, some custom made to create chaos in healthcare. On the other are cybersecurity defenders that try to keep malware at bay with shields and intrusion detectors.

From the Cybersecurity Command Center and in the Innovation Live area on the exhibit floor of the annual meeting of the Healthcare Information and Management Systems Society (HIMSS), a cybersecurity firm called Medigate showcased a hardware-software platform that can help health care providers defend against hackers. When installed on medical device networks, the platform can detect early signs of attack and potentially harden vulnerable equipment.

In a pre-HIMSS interview with Imaging Technology News, the company’s chief executive emphasized that, before this can happen, the information technology team and administrators of healthcare provider must understand its network of medical devices. The Medigate technology is specifically designed to make interconnected medical devices visible, said Medigate CEO Jonathan Langer. “It is the crucial first step” toward strengthening networked medical devices against cyber attack.

The company, which is headquartered in New York and conducts R&D in Israel, has identified tens of thousands of devices for dozens of health care systems, many in the U.S. and Canada. Corporate partners include Palo Alto Networks and Cisco.

Medical devices are most vulnerable, Langer said, if security flaws in their operating systems have not been adequately patched. This may be so because security patches, provided by the maker of the operating systems, were not adequately installed or because the software maker had stopped developing such patches because the operating systems had become obsolete.

Unpatched medical devices are common. And, if these devices are compromised, the impact can be devastating to both the institution and its patients.

“All of a sudden a medical device or an imaging device can be unavailable,” he said. “That can have a huge impact on a hospital’s operation.”

And this could be the least of the hospital’s problems. Cyberattackers may infect a hospital network with ransomware, which encrypts data, holding it hostage until the hospital pays for decryption. Alternatively, the attacker may be searching for patient information stored on archives.

“Cyber attackers may be looking for weak links in the network to reach this information,” Langer said. “So it can pivot from imaging (scanners) to the PACS, which holds an abundance of data, or to the EMR, which is a huge repository of highly valuable data.”

 

How Medigate Fights Cyber Crime

Langer got interested in cybesecurity while serving with the Israel Defense Forces. He later worked as vice president of technology at New York-based CyGov, which provides cyber defense solutions. Now, as the leader of Medigate, which he co-founded, Langer is warning the medical community about devices that are particularly vulnerable to attack — and how the protection for these devices can be improved.

Medigate makes a hardware-software combination — called, simply, the Medigate platform — that can mitigate the danger. The platform, which has both on-premise and cloud components, can be fine tuned to the operation of the healthcare provider.

When installed, it looks for the kind of behavior that signals an ongoing attack — for example, an incubator in the neonatal intensive care unit trying to communicate with an MRI scanner. The concern in this case would be that malware might have turned the incubator into a digital zombie or bot with the mission to infect or disable the MRI.

It also looks for subtle signs of suspicious behavior. These might, for example, look innocuous, digital traffic between a device and its manufacturer. Yet, such traffic might be the result of a successful cyber attack on the manufacturer.

“We alert the hospital to any remote connectivity so it is up to them from a policy perspective to either approve or disapprove of (the contact), he said.

 

Making Medical Devices Visible

Before the software can detect such threats, it maps all the interconnected medical devices. A large hospital may have a thousand or more of these devices, each of which exhibits a clearly visible “fingerprint,” Langer said — if you know where to look.

“Our discovery process gives us a good understanding of exactly what medical devices are installed and what their technical attributes are,” he explained.

The software can determine the make and model of each medical device on the network, as well as its operating system; current software version; and whether its security is at risk.

Not only does this map provide the basis for detecting the early signs of an attack, it identifies networked devices that Medigate can harden. Once vulnerable targets are found, Medigate can install “compensating controls” to help secure them.

Although nothing can completely protect “unpatched” medical devices, for example, the compensating controls from Medigate provide an additional layer of security. This may be achieved by segmenting the vulnerable devices or establishing additional firewalls for their protection.

Langer said he hopes people attending HIMSS will realize that enormous value can be derived simply by mapping networked devices. Identifying vulnerabilities must be done, if attacks are to be blunted.

“Network visibility is really the fundamental foundation of any cybersecurity program specific to medical devices,” he said. “Without that visibility, you’re just chasing a ghost.”

 

Related content:

How to Boost Cybersecurity in Medical Imaging

Cybersecurity Threats in Medical Imaging 

Medical imaging systems need more cybersecurity 

 

Editor's note: In preparation for the upcoming HIMSS (Healthcare Information and Management Systems Society) Conference on Feb. 11, contributing editor Greg Freiherr begins the show coverage with this exclusive podcast and accompanying blog. This is the final podcast in a series of three. You can listen to the first podcast, Hear and Now: How to Boost Cybersecurity in Medical Imaginghere. You can listen to the second podcast, Hear and Now: AI and Imaging, Your Data as Strategic Assethere.

Related Content

#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2

Getty Images

Feature | Coronavirus (COVID-19) | April 03, 2020 | By Melinda Taschetta-Millane and Dave Fornell
In an effort to keep the imaging field updated on the latest information being released on coronavirus (COVID-19), th
Varian received FDA clearance for its Ethos therapy in February 2020. It is an adaptive intelligence solution that uses onboard AI in the treatment system to take the cone beam CT imaging on the system, compare it to the treatment plan and deliver an entire adaptive treatment plan in a typical 15-minute treatment time slot, from patient setup through treatment delivery.

Varian received FDA clearance for its Ethos therapy in February 2020, shown here displayed for the first time at ASTRO 2019. It is an adaptive intelligence solution that uses onboard AI in the treatment system to take the cone beam CT imaging on the system, compare it to the treatment plan and deliver an entire adaptive treatment plan in a typical 15-minute treatment time slot, from patient setup through treatment delivery.

Feature | Treatment Planning | April 03, 2020 | Dave Fornell, Editor
The traditional treatment planning process takes days to create an optimized radiation therapy delivery plan, but new
An example of Philips’ TrueVue technology, which offers photo-realistic rendering and the ability to change the location of the lighting source on 3-D ultrasound images. In this example of two Amplazer transcatheter septal occluder devices in the heart, the operator demonstrating the product was able to push the lighting source behind the devices into the other chamber of the heart. This illuminated a hole that was still present that the occluders did not seal.

An example of Philips’ TrueVue technology, which offers photo-realistic rendering and the ability to change the location of the lighting source on 3-D ultrasound images. In this example of two Amplazer transcatheter septal occluder devices in the heart, the operator demonstrating the product was able to push the lighting source behind the devices into the other chamber of the heart. This illuminated a hole that was still present that the occluders did not seal. Photo by Dave Fornell

Feature | Radiology Imaging | April 02, 2020 | By Katie Caron
A new year — and decade — offers the opportunity to reflect on the advancements and challenges of years gone by and p
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus

Getty Images

Feature | Coronavirus (COVID-19) | April 02, 2020 | Jilan Liu and HIMSS Greater China Team
Information technologies have played a pivotal role in China’s response to the novel coronavirus...
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2 the company is now offering a suite of AI solutions Vuno Med-LungQuant and Vuno Med-Chest X-ray for COVID-19, encompassing both lung X-ray and computed tomography (CT) modalities respectively all at once
News | Artificial Intelligence | April 02, 2020
April 2, 2020 — In the face of the COVID-19 pand
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2 The Chinese start-up company Infervision launches its AI-based solution InferRead CT Lung Covid-19 also in Europe
News | Artificial Intelligence | March 31, 2020
March 31, 2020 — Lung infections generated by the coronavirus can be detected in...
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2 Doctor in our hospital is using this intelligent system for accurate diagnosis

Doctor in our hospital is using this intelligent system for accurate diagnosis. (Photo: Business Wire)

News | Artificial Intelligence | March 31, 2020
March 31, 2020 — The Intelligent Evalua...
#COVID19 #Coronavirus #2019nCoV #Wuhanvirus #SARScov2 behold.ai has developed the artificial intelligence-based red dot algorithm which can identify within 30 seconds abnormalities in chest X-rays. Wellbeing Software operates Cris, a widely used UK radiology Information System (RIS), which is installed in over 700 locations
News | Artificial Intelligence | March 31, 2020
March 31, 2020 — Two British companies at the leading edge of medical imaging technology are working together on a pl