Log in
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Dynamic quotes 

MarketScreener Homepage  >  Equities  >  Nasdaq  >  Cisco Systems, Inc.    CSCO


SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector newsMarketScreener Strategies

Cisco : Understanding Medical Device Security

09/08/2017 | 08:08am EST

Cisco Blog > Healthcare

Healthcare Richard Staynings - September 8, 2017 - 0 Comments

­­The FDA recall of a medical device last week has caused a bit of a media storm as the general public scrambles to find out more. The fact that a medical device meant to help sustain life is insecure and could be hacked to kill a patient is alarming to all of us. More worrying is that the medical device subject to the recall, a cardiac rhythm management product, or 'pacemaker' to the rest of us, is probably not an anomaly. Many other medical devices more than likely also lack adequate security.

To understand the risks, we first need to understand the problem. To be honest, this could require an extensive series of blog posts over weeks to fully examine and explain this properly, but here's the 50,000-foot version.

Different types of medical devices and the risks they pose

First, there are the implantable medical devices (IMDs) like the medical pacemaker at the center of this story. This group of medical devices includes the implanted insulin pump that security researcher Barnaby Jack demonstrated live on stage at the Miami Hacker Halted Conference in 2011, hacking the device to deliver a lethal drug dose. It also includes a pacemaker that was hacked, again by Jack, at the Melbourne BreakPoint Security Conference in 2012 to deliver a lethal 830 volt electric shock to a patient.

Second are the much wider range of network-attached medical devices used in healthcare delivery. These include:

  • Diagnostic imaging systems: ultrasound, MRI, PET, CT scanners, and X ray machines
  • Treatment equipment: infusion pumps, medical lasers, and surgical machinery
  • Life support: ventilators, anesthetic and dialysis machines
  • Medical monitors for oxygen saturation, blood pressure, ECG and EEG, and many, many more.

The greatest data-security risks for medical devices

The network-attached group far outnumbers the IMD group, but both have one thing in common-a very long life span! No one wants a pacemaker that needs to be replaced every year or two, and hospitals simply can't afford to rip and replace their multimillion-dollar investment in x-ray machines and PET and CT scanners if they still work perfectly. Many current medical devices are 15 or 20 years old already, placed into service when the rest of us were deploying Windows 95 and dial-up modems.

The greatest risk to medical devices, however, is that they lack even the basic security protections that a $200 home PC has-things like antivirus software and a host firewall. The danger is that when a malware worm gets into a hospital and spreads its way laterally across the network to reach highly vulnerable medical devices, it either quickly infects them (many of the newer models run a form of Windows XP), or the malware multicast traffic storm causes the medical device to crash or just stop working. It's not that someone hacked and changed a parameter-although that is a distinct possibility-but it's more likely that its battery becomes quickly drained and powers off, or the system blue screens and ceases to provide life-sustaining care.

It's going to take years to patch or replace the arsenal of insecure medical devices and billions of dollars that healthcare providers simply don't have. So, we need to look at alternatives to secure them for the rest of their life-spans.

How to reduce risk and protect devices

By far the most effective approach is microsegmentation, where medical devices are locked down and secured by the network they are attached to. (Attempting to manage 350,000 individual medical devices in a hospital is impossible.)

Modern network infrastructure supports security technologies like Cisco TrustSec©, where each network port acts as a virtual firewall. Using security group tags, network traffic is controlled so that only specifically authorized users-biomedical equipment technicians (or BMETs, as they are known)-have access to reprogram devices, and these systems are only able to communicate with designated internal IP addresses using predetermined ports and protocols. The network will drop everything else, like malware traffic and any connection attempts from unauthorized users. Many of the more advanced healthcare providers have already adopted such an approach, and by employing compensating security controls like TrustSec have been able to secure their networked medical devices from attack.

Learn more about Cisco's approach towards medical device security

Find out if TrustSec and Microsegmentation are right for you

For more information on cybersecurity solutions, get the details on Cisco's Digital Network Architecture for Healthcare and IoT Threat Defense for network-connected devices.


Cisco Systems Inc. published this content on 08 September 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 08 September 2017 12:07:03 UTC.

© Publicnow 2017
All news about CISCO SYSTEMS, INC.
02:20pCISCO  : DevNet Specialized Partners Gain API Insights for Pandemic Challenges
12:00pPART 1 : Manufacturers, it's time to reboot network security
11:32aCISCO  : Realizing the Value of Intelligent Virtual Meeting Assistants
11:12aCISCO  : and IBM launch new offering built on IBM Cloud Satellite
11:10aPEOPLE BEHIND CSR AT CISCO : Why we take ethics and integrity seriously
10:07aASPEN TECHNOLOGY  : Appoints Chantelle Breithaupt as Senior Vice President and C..
09:21aASPEN TECHNOLOGY  : Names New Finance Chief
09:08aCISCO  : Canadian Bacon – Zero to Hero when it comes to Zero-Trust
08:12aCISCO  : Webex named Official Collaboration Partner of McLaren Racing
08:12aOUR EVERYDAY SUPERHEROES : Women Leaders at Cisco
More news
Financials (USD)
Sales 2021 49 226 M - -
Net income 2021 10 483 M - -
Net cash 2021 17 925 M - -
P/E ratio 2021 18,5x
Yield 2021 3,18%
Capitalization 194 B 194 B -
EV / Sales 2021 3,57x
EV / Sales 2022 3,33x
Nbr of Employees 77 500
Free-Float 100%
Duration : Period :
Cisco Systems, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends CISCO SYSTEMS, INC.
Short TermMid-TermLong Term
Income Statement Evolution
Mean consensus OUTPERFORM
Number of Analysts 26
Average target price 51,43 $
Last Close Price 45,92 $
Spread / Highest target 30,7%
Spread / Average Target 12,0%
Spread / Lowest Target -2,00%
EPS Revisions
Managers and Directors
Charles H. Robbins Chairman & Chief Executive Officer
Richard Scott Herren Chief Financial Officer & Executive VP
Chuck Churchill Director-Information Technology
Mark D. Chandler Executive VP, Chief Legal & Compliance Officer
Roderick C. McGeary Independent Director
Sector and Competitors
1st jan.Capitalization (M$)
CISCO SYSTEMS, INC.2.61%193 864
ERICSSON AB10.51%42 756
NOKIA OYJ6.82%22 895