Fu And Blum: Article Analysis

Improved Essays
Medical devices are tools to help medical staff improve people’s health. What some of us don’t realize is how vulnerable those medical devices are and how they cause harm to the patients. Authors Kevin Fu and James Blum wrote an article to bring us up to date on the security of medical devices. In his article “Risks of Medical Device Software,” Fu and Blum explain to us what exactly goes wrong with medical devices and they suggest that medical cyber security must be improved to prevent from harming others. Both authors agree that in result of the decline of morality and availability caused by disregarded malware in medical devices led to deprive proper care and accurate medical results. In this article, the writers want their readers to be aware of the problem with medical devices and advocate for an upgrade in the device’s security. They begin by addressing the medical devices main issue which is software. Because medical devices run on software, they are vulnerable to cyber-attacks and malware. The authors stated that …show more content…
They give an example of a malware and state that the “Conficker is a relatively old piece of malware with well-known mitigation strategies.” The writers state that in 2012 reports show that most medical devices such as computers run the very basic and old Windows XP software. Security support was being shut down by medical device manufacturers, as a result there was no way a hospital and clinics were able to upgrade the devices software and security. According to Fu and Blum antiviruses aren’t always 100% secure. Anti-viruses are programmed to detect and exterminate files that may be harmful to the device. “On April 21, 2010, one-third of the hospitals in Rhode Island were forced to postpone elective surgeries and stop treating patients without traumas in emergency rooms.” (p.2) In the case given by the authors, the anti-virus deleted a very important Windows file that helped run the

Related Documents

  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HIPAA Violations

    • 355 Words
    • 2 Pages

    In order to achieve interoperability there are basic security standards that must be accounted for to ensure safe and secure exchange. Without adequate safe measures in place, personal health records cannot be safely transmitted electronically. Exchanging private health information electronically between medical partners comes with inherent risk however. Those risks include violation of HIPAA regulations and threats, vulnerabilities and malware that threaten electronic health records (EHR) or mainframe servers.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Conclusion: This review depicts, that both electronic health records and paper health records have vulnerabilities that have the potential to compromise patient data security. There are many who argue that the paper health records are more secure than the electronic health records. While electronic health records have their security vulnerabilities and have been more prevalent in the news, paper health records are not much more secure. Patient data security breaches in paper health records were not publicized as much as the electronic health records, because there is no way of knowing that they exist in order to report…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Jamara Gage

    • 128 Words
    • 1 Pages

    Jamara Gage. In the the article, MEDICAL DEVICES ARE THE NEXT SECURITY NIGHTMARE(Hay Newman)(2017)suggested that she believes medical devices are not as safe as you would think because of security hackers. In the article she discusses that several companies have put out warnings against security breaches in their medical devices. The author also stated that in some medical situation they aren't taking the negative aspects and possibilities of hackings that can happen serious, Such as when she says (“You'd think by now medical device companies would have learned something about security reform.…

    • 128 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Ethical Man Month Essay

    • 637 Words
    • 3 Pages

    As the system is connected to the internet its exposed to many threats (Security). ( Lukas Johansson & Mikael Auno(2006)) 2) When using a scalpel it’s essential that the scalpel does not hurt the patient or the surgeon (Safety). It’s also important that the scalpel follows the instructions of the surgeon precisely (Reliability). (Lukas Johansson & Mikael Auno(2006)) 3)…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NICU Asthma Case Study

    • 498 Words
    • 2 Pages

    Weber State University Web-Camera System in the Neonatal Intensive Care Unit NICview is a password-protected Neonatal Intensive Care Unit (NICU) webcam system mounted close to the premature infant, or patient, that allows remote viewing by parents and family members. (Hill, 2011) The system was designed to facilitate the bonding of parents with their infant by providing 24/7 access for remote locations. A NICU webcam program allows management of the camera by the NICU staff, meaning they have the ability to pause viewing while handling infants or during procedures. For security and privacy purposes, the program does not allow for recording or stored images of the infant and only authorized users are allowed access.…

    • 498 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Dr.Briggs and class, A policy is a purposeful plan of action or inaction developed to deal with a problem or a matter of concern in either the public or private sector. A policy includes the authoritative guidelines that direct human behavior toward a set of specific goals and provides the structure to direct action, including guidelines to impose sanctions that affect the conduct of affairs. Policies can be determined by the private or public sector that together can have a significant and long-lasting impact on communities and individuals. It is important to recognize that public policies are result of the politics and values of those determining the policy. governments create public by making decisions regarding a health issue such…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    Computer with patient information on them should also be put in a place where patients and visitors could not view them. This meant the doctors’ offices needed to place their computers in a secured location away from other patients and or visitors. If a computer was going to be used in a public place where other might be able to see. Then a 3M privacy screen should be used in order to keep other patients and or visitors from seeing what might be on the screen at any giving…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Transformation to electronic health records (EHR) has made patient records more vulnerable to data breaches. The top causes of medical data breaches that compromised PHI included theft, computer hacking, error by third-party custodians, and human negligence. Theft can be from an insider working at a health care facility who abuses their access privileges to information. Such employees seek information for the purpose of committing fraud. Theft can also be attempted by an outsider who can physically enter the organization and steal equipment such as laptops, smartphones, servers or USB drives.…

    • 733 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Managed Care Analysis

    • 957 Words
    • 4 Pages

    Managed care programs are focused on the accuracy and reliability of patient services, care and cost. While managed care programs implement, coordinate, and plan the services, care, and cost it’s vital to consider population health and disease management. Population health and disease management have been a significant part for managed care programs for decades and ways to improve and help patients is the goal. The role of primary care physicians and specialists is very important to address the population health and disease management. The unique and profound history of managed care programs have been in the spotlight for decades and more details will follow subsequently.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    From secure networks to HIPAA approve software facilities do everything they can to eliminate contamination and privacy concerns. However, telemedicine can still have some gaps in security. On the patients end many are working with…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ehr Disadvantages

    • 505 Words
    • 3 Pages

    With the rise of electronic health records (EHR) systems, it’s becoming more and more difficult for hospitals to keep patient info secure and accurate. Between clinicians accessing health records and hospital internal email messages via tablets and smartphones, and digital hackers becoming more sophisticated in their techniques to steal patient health information/record, and caused hospitals to face many cybersecurity challenges with new healthcare technology. According to center for Medicare and Medicaid service (CMS), U.S. hospitals have spent $1.6 billion each year for healthcare security system. Breaking it down by incident, hospitals have spent on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide (CMS, 2016). (To sum up, even though technology has many befits, there is no doubt there come along the risk of…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Food and Drug Administration (FDA) confirmed that certain implantable cardiac devices of St. Jude Medical have vulnerabilities that let the hacker access a device. The devices, such as defibrillators and pacemakers are used to control heart functions and prevent heart attacks. The penetrable devices under FDA’s warning are the Merlin@home Transmitters made by St. Jude Medical, which are the part of the home monitor. Pacemakers and other implanted cardiac devices use a wireless RF signal to connect to the home monitor.…

    • 251 Words
    • 2 Pages
    Improved Essays