Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
Photo of medical equipment in hospital ward setting

Securing the Internet of Medical Things

Posted on June 1, 2016June 1, 2016 By Davey Winder

The Internet of Things is an exciting prospect for healthcare; but how can the NHS ensure it is properly secured?

The healthcare sector turns conventional security thinking on its head; instead of seeing security as vital to service delivery, patient care is understandably the top priority. That’s not to say that cyber security isn’t factored in; but if it becomes a limiting factor in delivering that care in a timely fashion then it’s in danger of being factored straight back out again. It’s a conflict that healthcare management has managed to juggle pretty well, truth be told, but that could all be about to change. And the catalyst is the Internet of Medical Things.

It’s relatively easy to secure things from the perimeter. It is far less easy to secure ‘things’ that extend beyond fixed network architectures. Start throwing myriad connected devices into the healthcare equation and pretty quickly you end up with a new borderless network perimeter paradigm that cannot be adequately defended without a paradigm shift. This borderless network, often spread across multiple locations – and which could even include a patient’s home – comprises everything from wearable devices such as personal glucose monitors and fitness trackers, through to IV pumps.

Click here to read complete article

Threatscape Tags:Analysis, Health, IoT, Medical, NHS

Post navigation

Previous Post: How to prepare for serious cyber attack – and mitigate the risk
Next Post: The rise and rise of ransomware

Related Articles

Photo of front end collision, crash test of cars This Surprisingly Simple Hack Can Crash iPhones—Update To iOS 17.2 Now Hacking
Is ChatGPT a security threat? I asked, the AI bot replied. Analysis
Google Confirms Chrome Zero-Day #5 As Attacks Begin, Update Now News
Windows 10, 11 & Server Zero-Day Attacks Underway, Microsoft Says News
Microsoft Confirms Windows Users Targeted By 0Day Hack News
Who is Trickbot? EXCLUSIVE: Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks Analysis

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy