Log in
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Dynamic quotes 

MarketScreener Homepage  >  Equities  >  Nasdaq  >  Cisco Systems, Inc.    CSCO


News SummaryMost relevantAll newsPress ReleasesOfficial PublicationsSector newsMarketScreener StrategiesAnalyst Recommendations

Cisco : Understanding Medical Device Security

share with twitter share with LinkedIn share with facebook
share via e-mail
09/08/2017 | 08:08am EST

Cisco Blog > Healthcare

Healthcare Richard Staynings - September 8, 2017 - 0 Comments

­­The FDA recall of a medical device last week has caused a bit of a media storm as the general public scrambles to find out more. The fact that a medical device meant to help sustain life is insecure and could be hacked to kill a patient is alarming to all of us. More worrying is that the medical device subject to the recall, a cardiac rhythm management product, or 'pacemaker' to the rest of us, is probably not an anomaly. Many other medical devices more than likely also lack adequate security.

To understand the risks, we first need to understand the problem. To be honest, this could require an extensive series of blog posts over weeks to fully examine and explain this properly, but here's the 50,000-foot version.

Different types of medical devices and the risks they pose

First, there are the implantable medical devices (IMDs) like the medical pacemaker at the center of this story. This group of medical devices includes the implanted insulin pump that security researcher Barnaby Jack demonstrated live on stage at the Miami Hacker Halted Conference in 2011, hacking the device to deliver a lethal drug dose. It also includes a pacemaker that was hacked, again by Jack, at the Melbourne BreakPoint Security Conference in 2012 to deliver a lethal 830 volt electric shock to a patient.

Second are the much wider range of network-attached medical devices used in healthcare delivery. These include:

  • Diagnostic imaging systems: ultrasound, MRI, PET, CT scanners, and X ray machines
  • Treatment equipment: infusion pumps, medical lasers, and surgical machinery
  • Life support: ventilators, anesthetic and dialysis machines
  • Medical monitors for oxygen saturation, blood pressure, ECG and EEG, and many, many more.

The greatest data-security risks for medical devices

The network-attached group far outnumbers the IMD group, but both have one thing in common-a very long life span! No one wants a pacemaker that needs to be replaced every year or two, and hospitals simply can't afford to rip and replace their multimillion-dollar investment in x-ray machines and PET and CT scanners if they still work perfectly. Many current medical devices are 15 or 20 years old already, placed into service when the rest of us were deploying Windows 95 and dial-up modems.

The greatest risk to medical devices, however, is that they lack even the basic security protections that a $200 home PC has-things like antivirus software and a host firewall. The danger is that when a malware worm gets into a hospital and spreads its way laterally across the network to reach highly vulnerable medical devices, it either quickly infects them (many of the newer models run a form of Windows XP), or the malware multicast traffic storm causes the medical device to crash or just stop working. It's not that someone hacked and changed a parameter-although that is a distinct possibility-but it's more likely that its battery becomes quickly drained and powers off, or the system blue screens and ceases to provide life-sustaining care.

It's going to take years to patch or replace the arsenal of insecure medical devices and billions of dollars that healthcare providers simply don't have. So, we need to look at alternatives to secure them for the rest of their life-spans.

How to reduce risk and protect devices

By far the most effective approach is microsegmentation, where medical devices are locked down and secured by the network they are attached to. (Attempting to manage 350,000 individual medical devices in a hospital is impossible.)

Modern network infrastructure supports security technologies like Cisco TrustSec©, where each network port acts as a virtual firewall. Using security group tags, network traffic is controlled so that only specifically authorized users-biomedical equipment technicians (or BMETs, as they are known)-have access to reprogram devices, and these systems are only able to communicate with designated internal IP addresses using predetermined ports and protocols. The network will drop everything else, like malware traffic and any connection attempts from unauthorized users. Many of the more advanced healthcare providers have already adopted such an approach, and by employing compensating security controls like TrustSec have been able to secure their networked medical devices from attack.

Learn more about Cisco's approach towards medical device security

Find out if TrustSec and Microsegmentation are right for you

For more information on cybersecurity solutions, get the details on Cisco's Digital Network Architecture for Healthcare and IoT Threat Defense for network-connected devices.


Cisco Systems Inc. published this content on 08 September 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 08 September 2017 12:07:03 UTC.

share with twitter share with LinkedIn share with facebook
share via e-mail
Latest news on CISCO SYSTEMS, INC.
02/20CISCO : Phunware to Demonstrate Service Using Cisco's Webex Room Kits
02/20CISCO : Phunware Up 68%, Will Demonstrate Mobile Campus Service With Cisco
02/20CISCO : Innovates Cellular IoT Connectivity Management with 5G Readiness and Mac..
02/20GLOBAL MARKETS LIVE: Musical chairs
02/19CISCO : A new hotbed for innovation the public sector
02/19CISCO : Sheffield streets come to life as city's highway network gets UK's lates..
02/19U.S. urges EU to use 5G by Ericsson, Nokia, Samsung, seen on par with Huawei
02/18CISCO : Management's Discussion and Analysis of Financial Condition and Results ..
02/1820 years after dot-com peak, tech dominance keeps investors on edge
02/18CISCO : is #4 on Fortune 100 Best Companies to Work For Ranking
More news
Financials (USD)
Sales 2020 50 943 M
EBIT 2020 16 979 M
Net income 2020 11 853 M
Finance 2020 14 044 M
Yield 2020 3,05%
P/E ratio 2020 16,6x
P/E ratio 2021 15,6x
EV / Sales2020 3,58x
EV / Sales2021 3,42x
Capitalization 196 B
Duration : Period :
Cisco Systems, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends CISCO SYSTEMS, INC.
Short TermMid-TermLong Term
Income Statement Evolution
Mean consensus OUTPERFORM
Number of Analysts 27
Average target price 53,21  $
Last Close Price 46,30  $
Spread / Highest target 40,4%
Spread / Average Target 14,9%
Spread / Lowest Target -2,80%
EPS Revisions
Charles H. Robbins Chairman & Chief Executive Officer
Tiang Yew Tan Senior Vice President-Operations & Digital
Kelly A. Kramer Chief Financial Officer & Executive Vice President
Chuck Churchill Director-IT
Roderick C. McGeary Independent Director
Sector and Competitors
1st jan.Capitalization (M$)
CISCO SYSTEMS, INC.-3.47%196 332
ERICSSON AB7.28%29 676
NOKIA OYJ15.56%23 227