5 FBI Recommendations for Medical Device Cybersecurity

September 29, 2022 Decoteau Wilkerson


Jama Software is always on the lookout for news and content to benefit and inform our industry partners. As such, we’ve curated a series of articles that we found insightful. In this blog post, we share content sourced from Security – 5 FBI Recommendations for Medical Device Cybersecurity  – which was originally published on September 16, 2022, by Madeline Lauver.

5 FBI Recommendations for Medical Device Cybersecurity

While medical devices are often designed for decades of use in hospitals, the software needed to run them becomes outdated more quickly. This results in devices running vulnerable software on healthcare networks, which can expose patients to physical and cyber threats.

In response to the threats facing medical devices, the Federal Bureau of Investigation (FBI) has released recommendations for the healthcare sector to bolster the cybersecurity of medical devices.

Consequences of medical device cyberattacks

Cybersecurity threats to medical devices can initiate a range of adverse effects. “On the extreme side, you have the scenario where a medical device compromise could directly impact patient safety and potentially be life-threatening,” said Ben Denkers, Chief Innovation Officer at CynergisTek. “What could an attacker do if they took control of an insulin pump or pacemaker?”

While medical device takeovers have the potential to cause life-threatening consequences, many cyberattacks on medical devices lead to system downtime, rather than complete control of devices. “The most common consequence is healthcare organizations must deny service to the individual because the device no longer works or requires supporting infrastructure, which has also been compromised. Where time becomes a critical success factor in many medical emergencies, this can also have severe patient impacts,” said Denkers.

Related: MDIC, HSCC Team Up to Establish Medical Device Security Benchmarks

FBI medical device cybersecurity recommendations

To prevent cyberattacks on medical devices, the FBI released a list of recommended security strategies and technologies for healthcare cybersecurity leaders to adopt, including:

  1. Endpoint protection: Encrypt medical device data, use antivirus protection where able in medical devices, and monitor for cyber threats to the hospital network.
  2. Identity and access management: Use complex passwords and limit the amount of users with accessibility to medical device credentials. If possible, change medical device passwords on a regular basis.
  3. Asset management: Maintain an inventory of all medical devices and track their software lifecycle to replace devices when necessary.
  4. Vulnerability management: Scan devices for vulnerabilities and work with medical device manufacturers to update software.
  5. Employee cybersecurity awareness training: Training should target insider threat prevention and social engineering attack mitigation.

Related: FDA Releases New Guidance on Cybersecurity for Medical Device

This FBI guidance aims to provide the foundation of a robust healthcare security program that reduces medical device cyber risk. “Reducing risk is not a static, one-time process,” said Denkers. “Organizations need to have a program in place to identify ongoing risk and ensure safeguards are performing as designed. Doing so can allow organizations to have an upper hand when dealing with the ever-evolving threat landscape.”

For more medical device security information, read the full FBI recommendations.


Previous Flipbook
G2 Grid Report for Requirements Management Software Fall 2022
G2 Grid Report for Requirements Management Software Fall 2022

Jama Connect® was again named far and away the overall leader in the Fall 2022 G2 Grid® Report for Requirem...

Next Flipbook
A Guide to Good Systems Engineering Best Practices: The Basics and Beyond
A Guide to Good Systems Engineering Best Practices: The Basics and Beyond

In this eBook, we discuss the fundamentals of systems engineering best practices, the “V” model, we cover t...


First Name
Last Name
Pending Opt-In
All fields are required. Your privacy is important to us.
Thank you!
Error - something went wrong!