In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...
Cybersecurity
5 Best Practices That Could Have Protected You From Log4J
Log4j: What Is It? On December 9, 2021, a critical exploit named "Log4j" was disclosed to the world. This exploit was particularly harrowing due to the fact that the software library which it targeted is so widely utilized. “Log4Shell” (CVE-2021-44228,...
How Cyber Security Requirements Can Throw your Medical Device Off Track
In our last article we talked about the four steps your organization must go through when designing secure connected medical devices. With the increasing attention paid to product security in this era of connected medical devices, many companies are scrambling to keep...
Four Steps to Securing Your Company’s Medical Devices
Connected medical devices offer enormous opportunity for manufacturers and consumers alike. They also carry the burden of increased risk due to cybersecurity flaws. Think about the dangers of having your email or bank account hacked. Now consider the damage hacking a...
How to Navigate Compliance and Cyber Security Concerns in Smart Medical Devices
The Internet of Things is revolutionizing the medical device field. However, it’s also introducing new compliance headaches. What’s more, large-scale medical hacks loom large in the background. Medical device manufacturers can’t ignore the Internet of Things, but nor...
Security and Compliance – What Your Company Needs to Know Part 2: MBSA
You need more than just an antivirus and security suite to keep your system safe. You need multiple, non-redundant solutions covering various aspects of network security. In our last blog, we discussed the role of whitelisting in keeping your network secure. Now we’re...
Security and Compliance – What Your Company Needs to Know Part 1: Whitelisting
Security in the 21st century is a complicated game. The good guys are always playing catch up with the bad guys. Security is particularly important for medtech companies due to their specific compliance needs. Banking and fintech likewise have a high bar for security...
How to Pinpoint the Benefits and Security Risks of Intelligent Medical Devices
Traditional medical devices are quickly going the way of the ear horn for one simple reason: their valuable data is confined to the device. Some have short-term storage capabilities. None, however, capture data over time for long-term analytics or storage. Intelligent...
Podcast: Can IoT Jump These Five Hurdles? Episode 3 – IOT Device Serviceability and Environmental Impacts
In the third episode of our podcast series "Can IoT Jump These Five Hurdles?”, SPK & Associates' Chief Strategy Officer, Rajiv Mistry, explains the challenges of IOT device serviceability and environmental impacts. To see all published episodes, scroll down this...
Podcast: Can IoT Jump These Five Hurdles? Episode 2 – Sensor Interfaces and Smart Devices
In the second episode of our podcast series "Can IoT Jump These Five Hurdles?", we transition from a broad introduction of these five hurdles to a deeper dive into each challenge facing the Internet of Things. Let's begin with the smart device itself and it's digital...
Podcast Series: Can IoT Jump These Five Hurdles? – Episode 1: Introduction
Fusce tellus nisl, molestie et maximus at, ultrices eget mauris. Nulla ut augue in ipsum rutrum viverra. Morbi laoreet lorem id commodo blandit. Phasellus quis magna tristique, pharetra metus et, cursus elit. Vivamus finibus lorem id nulla elementum metus.
Today’s Growing IoT Problem: Embedded Software Security – An Interview with Cambashi’s Peter Thorne
When it comes to the Internet of Things (IoT) and connectivity, embedded software security is a top concern for a growing number of manufacturing companies and their software engineers. The worldwide market for embedded security software is forecasted to rise to $2.95...