Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 14

Do No Harm - Matthew Webster

Скачать книгу

and could use greater transparency so we as consumers can make better decisions.

      When it comes to cybersecurity, quite often universities are not the place to get that education. People walk out of school barely cybersecurity literate, but eager to start building IT systems. How secure do you think those systems will be if no one educates them on how to build secure systems? While there are certainly exceptions and companies have degree programs in cybersecurity, it does show the extreme deficit about the methods for protecting organizations. People who are interested in cybersecurity either need to learn on the job, go to a very specialized school, or go get cybersecurity certifications.

      From a software development perspective, organizations need to supplement the understanding of the workers to get on board. Further, the lack of cybersecurity education helps to contribute to a lack of understanding of cybersecurity within organizations. That, in turn, affects the culture of the organization and ultimately the cybersecurity posture within organizations. Only companies with strong regulatory requirements or that have gone through a breach feel that they need a team to get them up to speed. Some of the requirements of cybersecurity may even appear bizarre due to cybersecurity illiteracy.

      Another side of the equation is business perception around value. When IT was an up-and-coming phenomenon, many businesses perceived it as a cost center. They did not want to put the time and effort into supporting the men and women in that department. IT is now seen as a business enabler. Information security has had one foot in the cost center arena according to some businesses. The higher-risk and more highly regulated businesses elevated security more quickly as a business enabler—partially because it was. Various vendor risk programs required the security be heightened in order for business to commence. In heavy regulatory environments, they often had data breaches that cost them more and therefore security was given more clout to get the work done—they were not merely a cost center. They were protecting the business. They were seen as a business enabler. In these environments, despite the lack of education, they are able to form stronger cybersecurity practices—generally speaking.

      All of these are influences on the security of internet-connected medical devices, but they still do not tell a sufficient story. Obviously, internet-connected medical devices are influenced by the prevailing culture, but the security behind these devices has often lapsed well behind the security of other pieces of software. This, of course, does not mean there isn't software that isn't riddled with flaws, but it does mean that medical device security has often taken a back seat to security requirements if security is recognized at all. Combined with the constant drive to innovate, this only exacerbates the security challenges.

      To top it all off,

Скачать книгу