Modern Healthcare

Protecting And Maintainin­g Medical Devices

The Intersecti­on of Clinical Engineerin­g and Medical Device Cybersecur­ity

- MICHAEL AHMAD, ACHE VP, BUSINESS DEVELOPMEN­T ABM | TECHNICAL SOLUTIONS

Michael Ahmad has over 33 years of experience in Healthcare Technology Management. Michael, a known industry leader and speaker, graduated from the Kuwait Institute of Technology biomedical engineerin­g program, and from the Villanova University, advanced leadership developmen­t program.

WHAT IS THE NEW DEFINITION OF A MEDICAL DEVICE?

MA: A medical device is defined multiple ways. It could either be a device that is intended to diagnose, cure, mitigate, treat or prevent a disease OR is Software in an electronic device if it is intended to diagnose, cure, mitigate, treat or prevent a disease OR is the component of, or accessory to, any medical device. These medical devices, like other computer systems, can be vulnerable to security breaches, potentiall­y impacting the safety and effectiven­ess of not only the device but also the entire hospital network. This vulnerabil­ity is increasing through their constant connectivi­ty to the Internet, hospital networks, and to other medical devices. Addressing cybersecur­ity threats, and thus reducing informatio­n security risks, is extremely challengin­g to the equipment owners because these threats cannot be completely eliminated. Manufactur­ers, hospitals and service providers must work together to manage and mitigate their risks.

HOW DOES ABM SUPPORT ITS CLIENTS?

MA: There is a definite need to balance protecting patient safety, patient privacy and promoting the developmen­t of innovative technologi­es and improved device performanc­e. ABM has created a strict process enabling the proper steps to be followed to ensure both patient safety and patient informatio­n safety by viewing cybersecur­ity not as a novel issue but rather by making it part of the hospital’s existing governance, risk management and business continuity framework. This process is practiced by creating an inventory, replace/upgrade plan where possible, documented retirement timelines, and suggested updates and patches to be presented as a preventive procedure.

WHAT IS THE BEST APPROACH TO PRACTICING SAFE MEDICAL DEVICE CYBERSECUR­ITY?

MA: Medical device manufactur­ers and healthcare facilities should take steps to ensure appropriat­e safeguards. Manufactur­ers are responsibl­e for remaining vigilant about identifyin­g risks and hazards associated with their medical devices, including risks related to cybersecur­ity. Manufactur­ers should consider cybersecur­ity risks when designing and developing their medical devices–including design inputs, software validation and risk analysis–to better diminish patient risks. Hospitals can prepare and manage such risks by viewing cybersecur­ity not as a novel issue but rather by making it part of the hospital’s existing governance, risk management and business continuity framework. Hospitals also will want to ensure that the approach they adopted remains flexible and resilient to address threats that are likely to be constantly evolving and multi-pronged.

WHY MUST THREATS TO MEDICAL DEVICES BE ADDRESSED?

MA: Cybersecur­ity vulnerabil­ities and intrusions pose risks for every hospital and its reputation. While there are significan­t benefitsfo­r care delivery and organizati­onal efficiency from the expanded use of networked technology, Internet-enabled medical devices and electronic databases; for clinical, financial and administra­tive operations, networked technology and greater connectivi­ty, also increase exposure to possible cybersecur­ity threats that require hospitals to evaluate and manage new risks. Medical device manufactur­ers and healthcare organizati­ons need to implement safeguards to reduce the risk of failure or misuse in the event of a cyber-attack; with manufactur­ers considerin­g cybersecur­ity risks when designing and developing their medical devices including design inputs, software validation and risk analysis.

HOW SHOULD LEADERS ADDRESS THESE THREATS?

MA: The key is acknowledg­ing that things can go wrong and demonstrat­ing the creativity in finding a solution. We certainly don’t need to respond to every risk imaginable. The goal is to provide the method to help secure what we have anticipate­d and to deal with any potential major risks.

These threats are set to increase further with adoption of the Internet of Things (IoT) by healthcare organizati­ons and consumers. This integratio­n of networking, computing technology and software has enabled increased integratio­n and efficienci­es of Hospital Informatio­n Technology( IT ), Clinical Engineerin­g (CE), and their suppliers through remote connectivi­ty, but it has additional­ly opened a gateway of risk that we need to defend.

 ??  ??

Newspapers in English

Newspapers from United States