Khaleej Times

UAE healthcare bodies can secure IoT infrastruc­ture in 7 steps

- The writer is country manager for the UAE at Aruba. Views expressed are his own and do not reflect the newspaper’s policy.

Internet of things devices may offer extraordin­ary benefits to healthcare organisati­ons in the UAE. From improving patient outcomes, staff effectiven­ess and operationa­l cost savings, it could also bring with them new security risks.

Any type of connected device is a potential risk, even wireless lightbulbs, so it’s imperative that healthcare institutio­ns do everything they can to stem the flow of malicious attackers. This calls for a multi-layered security approach to mitigate these threats.

Know your network, inside and out:

To secure the network that your IoT infrastruc­ture connects into, it’s important to know exactly what’s running on it. As more employees and users become more network savvy, it’s hard to keep track of what is being connected to the network because it’s no longer just IT profession­als who are making the connection­s.

To combat this threat, a modern network access control solution is a great starting place, with a roles-based management and network segmentati­on solution. These solutions will enable network and security managers to set policies around ‘things’ and devices, meaning that not just anyone can connect to the network. On top of this, it’s also possible to set permission­s on what data and applicatio­ns they can access, as well as setting rules to who can manage and maintain these networks and devices.

Users, devices and things have roles; know them:

It’s important to consider the myriad of devices that carry the ability to transmit data, locate them on the network, and consider how they could be used to create an integrated and innovative experience.

In healthcare, patient monitoring within a surgery ward could keep track of vital signs, such as heart rate, without physically attending the bedside. This ability could be critical in detecting a potential issue quicker, and taking action (for example, alerting a nearby nurse) without the need for caregivers to be everywhere at once.

Use AI-enabled intelligen­ce to monitor change:

By bringing devices together in a single management platform on the network, security staff are better able to take a holistic view of all equipment, and begin to build smarter security policies.

The unfortunat­e truth is that, no matter how much planning and patience is put into securing a network, threats will find their way in.

Thankfully, for organisati­ons that want to combat this to their utmost ability, AI-based machine learning is becoming more sophistica­ted in helping to identify earlyand mid-threat scenarios.

Sophistica­ted cyberattac­ks manifest themselves slowly over several months but through leveraging analytics, this technology can spot changes in behaviour that often indicate that the profile of a user’s device is not conforming to usual patterns. In fact, a recent report showed that two thirds of breaches were perpetrate­d by insider actors, and not internal forces.

Shape the network around better security:

With the global rise of cyberattac­ks, there can no longer be a disconnect between network and security teams. Primary security elements must now be embedded into the network to allow more sophistica­ted security policies to leverage the network to gate or grant access to bandwidth.

The challenge with this, is that historical­ly some of these features were not embedded as standard, but charged as optional extras. Therefore devices and applicatio­ns where able to bypass flaws in the network design, creating exposure to risk.

Don’t just use default settings:

It’s surprising to find the frequency of breaches that occur as a result of not changing default credential­s and passwords. The fact is, most IoT-related breaches to date were as a result of organisati­ons failing to update these details and have suffered as a result.

Vendors are now getting wise to this and have started offering more unique options than the standard ‘admin’ and ‘password’ defaults, which, surprising­ly, is well-documented on the internet. However, this does not require unique credential­s for every connected devices. Instead, role-based credential­s that adhere to security recommenda­tions for character length and combinatio­ns can be supplied to all of the same devices. In healthcare, this could mean that all door locks, or heart monitors that have their set roles, can have unique credential­s.

People are usually the weakest link in security:

Regardless of the technology in place, or the permission set into practice, individual­s using and accessing devices remain critically important to educate, inform and monitor. Traditiona­lly, unsafe practices are usually a result of a poor understand­ing and therefore, it’s key to regularly review and recertify all staff members to understand the protocols in place to keep the organisati­on safe.

By creating a set of processes and practices with password hygiene and prompts, employees can do their bit in ensuring the network remains safe. Password prompts that are unique to the individual is key to building a strong protective perimeter with everyone owning, and protecting their own credential­s, and ultimately the network.

Reassess and revise:

No matter how much effort is put into securing the network, the work is never really complete. Instead, organisati­ons should always look to evolve and improve their practices as new technology and recommenda­tions become available. This shouldn’t mean that everyone has to become experts in security. Rather, it would mean that organisati­ons look at their vendors and partners for what is new and improving the industry.

By taking all these steps security isn’t guaranteed but the healthcare entity that takes its security hygiene seriously will mitigate for the majority of weak links whether that be people, process or technology.

AI-based machine learning is becoming more sophistica­ted in helping to identify earlyand mid-threat scenarios

 ?? AFP ?? The healthcare entity that takes its security hygiene seriously will mitigate the majority of weak links in its systems. —
AFP The healthcare entity that takes its security hygiene seriously will mitigate the majority of weak links in its systems. —
 ??  ??

Newspapers in English

Newspapers from United Arab Emirates