Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 23

Do No Harm - Matthew Webster

Скачать книгу

actions that hospitals and doctors’ offices would otherwise need to create on their own. While sometimes there is a significant customization effort, these tools can provide companies with huge cost savings. Many of these companies also provide the compliance and security necessary to secure the data. Of course, these third-party vendors are far from perfect. Atrium Health had to notify 2.65 million individuals of a data breach as a result of AccuDoc being breached.34 So, due diligence related to the vendors is a must just as with any technology.

      Mobile Devices and Applications

      Clinal Monitors

      Websites

      Part of the connected world is a need for instant access to data—especially when it comes to hospitals. The more up-to-date the information, the more valuable that information is. There are numerous ways of collecting that information, but quite often with IoMT, that information's repository is an EHR system. That means the mobile devices, which are quite often connected via cellular technology, will need a way to access the data from the internet. Websites are a common tool to collect that information—whether it is directly through the EHR or through an independent website. Websites have all the flaws that we have previously mentioned and tend to be dependent on hardware or the cloud, an operating system, and software development.

      Putting the Pieces Together

      A few might argue that recent legislation may have solved the problems related to vulnerabilities found within connected medical devices. While improvements have been made, there are still enormous challenges related to securing these devices. Legacy systems pose tremendous risks for organizations. With IoMT devices providing more value, especially in the time of COVID-19, the problems are only going to grow over time.

Schematic illustration of the interconnection of IoMT technologies.

       “Make changes at the operating system level of the device with effects such as rendering the device unusable, otherwise interfere with the function of the device, and/or

       Make certain changes to alarm settings on connected patient monitors, and/or

      At the time of this writing, in 2020 alone, GE has had eight critical vulnerabilities released. These are easily explorable on their website, so I will not list each one. I can also look at a host of

Скачать книгу