Warning! OUTDATED BROWSER DETECTED!   Please update your browser immediately for a better experience on this website. Learn More
21/xsl/MobileMenu.xsltmobileNave880e1541/WorkArea//http://dev2.rsna.org/RSNANewsDetailWireframe.aspx?pageid=15319&id=18984&ekfxmen_noscript=1&ekfxmensel=falsefalsetruetruetruefalsefalse10-18.0.0.0730truefalse
  • Cybersecurity Increasingly Critical for Medical Imaging

    Cybersecurity is not just for laptops, servers and desktop computers anymore. Any Internet-connected device—including medical equipment containing patient information—is a potential target for hackers, cyber criminals and even nation states, experts say. By Ed Bannon


    April 12, 2016

    The expansion of digital CT scans, MRIs and ultrasound has increased the need to secure the integrity of these images, which often contain sensitive protected health information (PHI) and can be used for Medicare fraud, identity theft and other illegal activity. 

    “In radiology, a denial exists that imaging devices are not in need of security,” said J. Anthony Seibert, Ph.D., professor and associate chair of informatics in the Department of Radiology at the University of California Davis Health System, Sac­ramento. “That mindset needs to be overcome.” 

    Although many clinics and medical centers have effective cybersecurity programs, many others have not acknowledged the seriousness of the threat to PHI. 

    More than 111 million health information secu­rity incidents in 2015 were attributed to hacking, up from just 1.8 million in 2014, according to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights report. Although only five breaches accounted for 97 percent of those incidents, any security breach can cause serious repercussions. 

    “You don’t want to be the data center in the news for being hacked,” said Rik Primo, chair of the Medical Imaging & Technology Alliance (MITA) Cybersecurity Taskforce. MITA, a division of the National Electrical Manufacturers Association (NEMA), released the NEMA/ MITA 2015 “Cybersecurity for Medical Imaging” white paper at RSNA 2015, which offers numerous related resources. 

    Security breaches occur when hackers conduct reconnaissance on a network by looking for the Internet Protocol (IP) address of medical equipment that appears to be vulnerable. Once hackers exploit a vul­nerable medical device, they can leverage that device as a “jumping off” point to access the rest of the facility’s network. 

    In the process, the hacker could accidentally, or deliberately, cause the medical device to malfunction. While no life-threatening scenario like this has ever been documented, it is theoretically possible, if ade­quate cybersecurity counter measures are not in place, Primo said. 

    Cybersecurity Should be Part of Workplace Culture 

    Because of hacking threats, radiologists operating equipment linked to a computer network should help their healthcare organization’s man­agement integrate cybersecurity into the workplace culture, Primo said. 

    He describes an optimal cybersecurity program as one that creates an “ecosystem of shared awareness and responsibility” among medical device manufacturers, IT departments and radiologists. 

    Medical device manufacturers play their role by instituting security by design, which integrates security measures into the medical device from its inception. This practice makes it harder for hackers to com­promise a system. 

    To guide healthcare pro­viders, and especially imaging departments through the secu­rity process, the Healthcare Information and Management Systems Society (HIMSS) and NEMA jointly published a document, “Manufacturer Disclosure State­ment for Medical Device Security,” or MDS2. The document stan­dardizes the information that radiologists should expect of device man­ufacturers to explain the security features and vulnerabilities of imaging equipment when they are implementing the highly recommendable IEC/ISO 80001-1 Cybersecurity Risk Management Process Standard in their departments. 

    The best-designed system, however, can be subverted by users who are not really aware of cybersecurity threats, Primo said. He has been shocked to hear of laptops stolen from medical offices with PHI stored on the laptop’s non-encrypted hard drive. 

    Dr. Seibert said radiologists get frustrated with security software when it slows down the network. “Some of the things we do to pre­vent threats also prevent us from getting instantaneous access to all the images we use to optimize patient care,” Dr. Seibert said. The best security systems are seamless to the users, because when security sys­tems start to harm performance or become onerous to the users, the users find ways to circumvent security protocols, which usually create an opening for hackers. 

    But Dr. Seibert believes this seamlessness can be achieved in the future through technological advances such as biometric scans to replace passwords and near-field communication devices, which require physical proximity to operate a device. 

    Educating personnel on cybersecurity risks is another key step to ensure that staff members understand the need for sometimes tedious security measures, Dr. Seibert said. 

    Embedding IT Staff Can Keep Hackers Out 

    The third component to a healthy cybersecurity ecosystem is the IT staff. Not only should the IT staff build a firewall to keep hackers out, they should be running system scans to detect intrusions, Dr. Seibert said. Because those system scans are notorious for slowing down oper­ations, the IT department at Dr. Seibert’s institution built part of its network isolated from the Internet to eliminate the need for constantly scanning security software. 

    Primo recommends embedding IT staff in technology-heavy depart­ments such as radiology. Rather than being called when a problem emerges, an embedded IT staff member is better positioned to prevent problems, teach users the corrrect use of the IT application, suggest improvements, and coach staff through security procedures. 

    “It’s an ecosystem of shared responsibility,” he said. “If just one per­son in the chain fails to do what is right, cybersecurity can be compro­mised. It’s all about people, processes and technology.”




    Seibert-sm
    Seibert

    Primo-sm
    Primo

    Web Extras




    To:
    From:
    Subject:
    Comment:
    Link:
      
  •  
    comments powered by Disqus