Healthcare Networks: 63% Exploited Vulnerabilities - Team82

Claroty, specializing in cyber-physical systems (CPS) protection, unveils a report at HIMSS24 revealing worrisome securi

Claroty, a company specializing in cyber-physical systems (CPS) protection, unveiled a new report at the HIMSS24 conference, shedding light on concerning data regarding the security of medical devices linked to healthcare organization networks like hospitals and clinics. The State of CPS Security Report: Healthcare 2023 revealed that a significant 63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) were present on these networks, with 23% of medical devices—ranging from imaging devices to clinical IoT devices and surgery devices—having at least one KEV.

In the inaugural healthcare-focused edition of The State of CPS Security Report, Team82, Claroty's renowned research group, delves into the escalating challenge posed by the growing number of interconnected medical devices and patient systems being integrated online, thereby heightening the risk of cyberattacks aimed at disrupting hospital operations. The primary objective of this research is to showcase the extensive connectivity of critical medical devices—ranging from imaging systems to infusion pumps—and elucidate the repercussions of their online exposure. Team82's research consistently uncovers vulnerabilities and implementation flaws, which can directly impact patient outcomes in various scenarios.

Amir Preminger, the vice president of research at Claroty, emphasized, "The surge in connectivity within hospital networks has revolutionized patient care, enabling doctors to diagnose, prescribe, and treat remotely with unprecedented efficiency. However, this increased connectivity necessitates robust network architecture and a comprehensive understanding of the associated risks posed by potential attackers. Healthcare organizations and their security partners must formulate policies and strategies that underscore the importance of resilient medical devices and systems capable of withstanding intrusions. This entails secure remote access, prioritization of risk management, and the implementation of segmentation."

More Information : https://www.techdogs.com/tech-news/pr-newswire/63-of-known-exploited-vulnerabilities-tracked-by-cisa-are-on-healthcare-organization-networks-clarotys-team82-finds

License: You have permission to republish this article in any format, even commercially, but you must keep all links intact. Attribution required.