Addressing Vulnerabilities in Medical Devices - PowerPoint PPT Presentation

About This Presentation
Title:

Addressing Vulnerabilities in Medical Devices

Description:

Medical devices are just like other computer systems; they can be vulnerable to data and security breaches and affect safety features. As we know, almost every primary medical device is connected to the Internet. Due to this rapidly increasing of cyberattacks on medical devices. We need to address vulnerabilities in medical devices. The no. of cyberattacks on medical devices is increasing day by day, if we want to stop these cyber-attacks, we need to find the vulnerabilities in medical devices. In this case, ASIMILY helps you a lot; it offers you many solutions like inventory Management, risk monitoring, prevention & remediation, and device tracking, etc. You should contact them. – PowerPoint PPT presentation

Number of Views:30
Slides: 10
Provided by: asimily
Category: Other

less

Transcript and Presenter's Notes

Title: Addressing Vulnerabilities in Medical Devices


1
ADDRESSING
  • VULNERABILITIES IN MEDICAL DEVICES

ASIMILY
Iot CyberSecurity For Medical Devices
2
DISCUSSION
OUTLINE
Brief Introduction Addressing vulnerabilities in
Medical Devices. Weak links with cybersecurity
Avoid cloud infrastructure Using open-source
software Poor internal security protocols
Urgent/11 Contact Us
TODAY'S HIGHLIGHTS
3
INTRODUCTION
Medical devices are just like other computer
systems they can be vulnerable to data and
security breaches and affect safety features. As
we know, almost every primary medical device is
connected to the Internet. Due to this rapidly
increasing of cyberattacks on medical
devices. We need to address vulnerabilities in
medical devices.
ASIMILY
4
ADDRESSING VULNERABILITI ES IN MEDICAL
WEAK LINKS WITH CYBERSECURITY This the major draw
back of
medical
device manufacturers companies. Most
of the medical device manufacture
companies have very weak links with
cyber-securities.
DEVICES.
Due to this weak infrastructure of manufacturing
medical devices, companies cyber-attackers are
attracted towards medical companies.
5
AVOID CLOUD
INFRASTRUCTURE
The second major drawback of medical
manufacturers who ignores the importance of
cloud infrastructure. Cloud technology gives
speed and efficiency, which can easily save
patient lives. Lack of cloud computing
professionals in these companies and not knowing
cloud computing in staff members can don t
understand the port data security. The legacy
system can lead to cyberattacks.
6
The developer develops the code with its hard
work and gives a lot of time to provide good
quality software.
Many lazy developers copy the existing code from
the unsecured website and build software for
medical devices. But here, cyberattacks take
advantage of this open- source software. They
can easily bypass the system and crack the
software of the medical device.
USING OPEN-SOURCE SOFTWARE
7
POOR INTERNAL
ASIMILY
SECURITY
Some medical device manufacturers don
t have strong internal policies. The weakest
link in the manufacturing company is their emplo
yees. They need to check their
records of their employees
PROTOCOLS
because they can be criminals
and comes here to hack medical
devices or take some sensitive information.
8
URGENT/11
It is the latest vulnerability found in medical
devices. It is based on third-party software
which used to communicate one computer network
to another network. It targets the common
sharing medical devices. For example, WIFI
router. IT security teams should make their
security protocol strong by firewalls and VPN so
that any hacker cannot breach data integrity.
9
GET IN TOUCH WITH US
MAILING ADDRESS 440 N Wolfe Rd, Sunnyvale,
CA 94085, USA PHONE NUMBER 408
627-4097 WEBSITE https//www.asimily.com/
Write a Comment
User Comments (0)
About PowerShow.com