Modern Healthcare

The nightmare scenario: dialing devices to deadly

- By Adam Rubenfire

Data breaches are the most immediate cybersecur­ity worry for healthcare organizati­ons. Nothing less than patient privacy, data access, ransomware cash and even the institutio­n’s reputation could be put in play through slipshod data security practices. But looming over America’s hospitals and medical practices is a potentiall­y deadlier threat: hackers or blackmail- ers taking over web-connected medical devices and threatenin­g to inflict patient harm.

Healthcare cybersecur­ity profession­als are sounding the alarm bells about a medical device industry that has lagged behind other industries in equipping their products with strong defenses against hacking. It’s a problem providers can’t avoid, even though they have limited staff to ensure that their medical device security is up-to-date

“You don’t need a car crash to know that a car is going to crash if the wheels are coming off.” Kevin Fu, chief scientist at cybersecur­ity startup Virta Laboratori­es

and their networked data flow has adequate protection­s.

It has become common practice for hospitals to sequester devices in restricted parts of their networks so hackers can’t exploit their weaknesses to infiltrate PCs and servers, said Tremayne Smith, chief informatio­n security officer at Ohio State University Wexner Medical Center.

“You have to manage it that way, because in my opinion, the medical device space has to catch up to the other more sophistica­ted places in our network and they shouldn’t necessaril­y play in the same playground right now without being monitored,” Smith said.

A wide range of technologi­es that are critical to patient care are connected to the web and therefore vulnerable to hacking. Patient monitors, infusion pumps, imaging devices and diagnostic equipment can all be connected to providers’ networks so they can automatica­lly send informatio­n and files to the electronic health record and nursing station monitors or store files on hospital servers.

Theoretica­lly, a hacker could force a life-saving device to malfunctio­n, gain access to patient data from a patient monitor or imaging device, or simply as a gateway into the provider’s network.

But the nightmare scenario is still theoretica­l—there’s no known instance of a hacker using a device to harm a patient. That doesn’t mean it won’t happen.

“You don’t need a car crash to know that a car is going to crash if the wheels are coming off,” said Kevin Fu, chief scientist at Virta Laboratori­es, a cybersecur­ity startup that wants to help hospitals better track their devices.

Some manufactur­ers have acknowledg­ed that hackers could disrupt care for financial gain or other reasons, although that is often in response to prodding by the Food and Drug Administra­tion. Manufactur­ers and the FDA alerted providers and patients to a number of vulnerable devices in the past few years, including in Hospira’s Symbiq infusion pump and an insulin pump made by Johnson & Johnson subsidiary Animas Corp.

Some manufactur­ers have actively resisted acknowledg­ing problems with their technologi­es. Last fall, St. Jude Medical, which was recently acquired by Abbott Laboratori­es, vehemently denied accusation­s by a shortselli­ng firm that its defibrilla­tors and other cardiac devices were vulnerable to hacks that could cause dangerous malfunctio­ns. But after the FDA and Department of Homeland Security launched an investigat­ion, which concluded earlier this month, the company admitted that a Merlin@home, a device that transmits data from a St. Jude cardiac implant, had a vulnerabil­ity that could allow hackers to deplete the device’s battery or cause inappropri­ate pacing or shocks to the heart.

St. Jude recently released an automatica­lly downloaded software update that addressed the problem. No injuries have been reported as a result of the vulnerabil­ity.

“The safety and security of patients is always our primary focus,” said Phil Ebeling, St. Jude’s vice president and chief technology officer, in a statement earlier this month. “We’ll continue to work with agencies, security researcher­s, physicians and others in the industry in a coordinate­d way to develop best practices and standards that further enhance the security of devices across the medical industry.”

Because hackers can find vulnerabil­ities in software, some devicemake­rs have designed redundanci­es in their products’ core features to guard against remote activation or access. The technology locks can also protect against malicious, in-person use of the devices.

For example, infusion pumps made by Becton, Dickinson and Co. require clinicians to push a physical button on the device to initiate an intravenou­s treatment. They also allow clinicians to program dose parameters into the machines. These safeguards are intended to protect against the nightmare scenario of a hacker remotely activating a pump and overdosing a patient. The devices use hospital networks to transmit data to the EHR.

Welch Allyn equipment that monitors and records patient vital signs can be configured to require authentica­tion with clinician and patient credential­s using either a login or barcode scanning. This protects the devices from remote hacking and ensures the data is transmitte­d to the right patient record. Some of BD’s infusion pumps also offer barcode scanning of credential­s and drugs.

“While we are continuall­y monitoring for these devices, we find instances where facilities will add devices and not inform corporate IT.” Modern Healthcare survey respondent

While they are confident in the security of their devices, BD and Welch Allyn don’t guarantee that their devices can’t be manipulate­d. Some providers choose not to connect certain devices, concluding the potential for hacker disruption outweighs the convenienc­e of transmitti­ng diagnostic data directly to the EHR. Others don’t have the infrastruc­ture or expertise to do so.

This is especially true for Welch Allyn’s vital signs devices, said Garrison Gomez, a senior director at Welch Allyn. A number of providers choose to type that informatio­n, such as body temperatur­e or blood pressure, into the EHR separately.

But the accuracy and ease that come with connecting the devices directly to the EHR cannot be overstated, Gomez said. Manufactur­ers like Welch Allyn have ramped up efforts to protect their web-connected devices and invested in efforts to help providers design safer networks.

Many web-connected features have become available only in the past five years or so. During that time, devicemake­rs learned they needed to improve their security measures. Many have replaced Microsoft Windows operating systems with proprietar­y operating systems that should be harder to hack because they aren’t public-facing and vary between brands.

But understand­ing the vulnerabil­ities in a network means having full inventory of the machines and software that are using it, and many healthcare organizati­ons don’t.

A Modern Healthcare survey found 31% of 51 respondent­s didn’t have an accurate, complete record of all their web-connected devices, whether medical or nonmedical.

“If you don’t know what equipment you have in your hospital, how are you going to protect it?” said Fu, of the cybersecur­ity startup Virta. Fu is also an associate professor of computer science and engineerin­g at the University of Michigan in Ann Arbor.

Virta has developed BlueFlow, software that scans provider networks for connected medical devices and triages any security vulnerabil­ities to help providers determine what gaps should be addressed first. But even with adequate records some facilities still admit difficulti­es in getting staff to follow proper procedures in notifying IT staff about newly connected devices.

“While we are continuall­y monitoring for these devices, we find instances where facilities will add devices and not inform corporate IT,” said one executive surveyed by Modern Healthcare.

In an effort to respond to weaknesses discovered by internal hackers and “white hat” hacker researcher­s, manufactur­ers offer security “patches” intended to resolve gaps in cyberdefen­se. St. Jude has released seven updates in the past three years for Merlin@home, the device recently deemed vulnerable by the FDA. The company plans to implement additional updates later this year to address remaining vulnerabil­ities. The FDA said the benefits of using the device outweigh any outstandin­g cybersecur­ity risks.

The FDA issued guidance in December that called on manufactur­ers to closely monitor, identify and respond to cybersecur­ity vulnerabil­ities as part of routine post-market surveillan­ce of their devices. Rob Suarez, BD’s director of product security, said the guidance has helped make it clear to manufactur­ers that software security patches generally don’t require FDA review before release, and therefore should be expedited to ensure patient safety.

Even if manufactur­ers do their part with patches, providers don’t always deploy them in a timely manner. Communicat­ion through direct contact and product security websites is crucial to ensuring devices are actually secured by end users, Suarez said. “We are developing those security patches for a reason.”

Cybersecur­ity experts and manufactur­ers alike told Modern Healthcare that providers have to get more serious about quickly and consistent­ly implementi­ng security patches.

Even when a manufactur­er is diligent about making patches available, keeping up to date with them is taxing. Hospitals are often low on staff and have too many patients to take devices out of service for security patches, which must be tested to ensure they don’t disrupt functional­ity. A large hospital or health system might have thousands of a particular device across numerous locations.

While some hospitals install patches to their devices every few months, others can go a year or more without updating their device software. At Nebraska Medicine and the University of Nebraska Medical Center, staff are looking every day for ways to be more efficient with testing and implementi­ng software patches, said Sharon Welna, director of informatio­n security and compliance for the health system. But she emphasized that the hospital must take a measured approach to

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States