One area within health care that continues to be a challenge for the industry is securing medical devices. As more of these devices connect to the Internet and hospital networks, the more the security risk to the organization increases. Medical devices, just like any network-connected device, are susceptible to security breaches, which can affect patient safety and the devices’ effectiveness within the health care network.
While security risks cannot be completely mitigated, there are steps organizations can take to lower their inherent risks, including:
In October 2018, the Food and Drug Administration (FDA) released the Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook, developed in conjunction with The MITRE Corporation, to assist health care organizations in securing medical devices. While this playbook is a great supplement to an organization’s existing incident response plan and preparedness, organizations should also look at leveraging technologies, such as network access control, to segment these devices on their networks and block potential rogue devices or bad actors from gaining access to these devices.
It is also essential that security awareness training is in place and occurs at least annually, and that clinical staff are included in this training.
As more medical Internet of things (IoT) devices become Internet and network connected, health care organizations need to continue partnering with MDMs to create a strong medical device security program utilizing access control technologies such as network access control. These technologies can provide organizations with threat protection and identification, help lock down medical devices, and provide the ability to audit these devices to reduce the risks not only to the organization but also, and more importantly, to the patient’s safety.
If you are looking to address medical device security risks, Sikich is here to help.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Sikich
Sikich is a global company specializing in technology-enabled professional services. With more than 1,900 employees, Sikich draws on a diverse portfolio of technology solutions to deliver transformative digital strategies and is comprised of one of the largest CPA firms in the United States. From corporations and not-for-profits to state and local governments and federal agencies, Sikich clients utilize a broad spectrum of services* and products to help them improve performance and achieve long-term, strategic goals. *Securities offered through Sikich Corporate Finance LLC, member FINRA/SIPC. Investment advisory services offered through Sikich Financial, an SEC Registered Investment Advisor.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Microsoft Fabric
Microsoft Fabric for Dynamics 365: What you need to know
December 4, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Driving efficiency: How Microsoft Dynamics 365 F&SCM out...
December 3, 2025
Security
Why Windows Hello Is More Secure Than You Think: A Defense a...
December 2, 2025
QMS
Accelerating QMS Implementations with CSA, Automation, and A...
December 1, 2025
Information Technology
Phishing Simulations: Why Regular Testing Improves Cyber Res...
November 25, 2025
Information Technology
How Law Firms Can Protect Client Confidentiality in a Digita...
November 24, 2025
Information Technology
The Critical Role of Automation Tools in Endpoint Management...
November 21, 2025
Managed Services
Give Your Identity Strategy the Gift of a Year-End Review
November 20, 2025
QMS
Navigating Generative AI in Life Sciences QMS: Opportunities...
November 19, 2025