11
min reading time
The Internet of Medical Things (IoMT) has transformed the healthcare sector worldwide by allowing continuous remote patient monitoring, real-time data collecting, and improved treatment results. According to a recent analysis by Grand View Research, Inc., the global IoMT market is predicted to reach USD 861.3 billion by 2030 and to increase at a 16.8% CAGR from 2023 to 2030.
However, the growing expansion of Internet of Medical Things devices has increased cybersecurity concerns and threats as well. According to the result of Cynerio’s latest research survey with the Ponemon Institute on IoMT threat and defense trends, 43% of hospitals have suffered a data breach in the past two years. Even more concerning is that 76% of ransomware-attacked hospitals were attacked three or more times.
As a great amount of the data collected by IoMT devices are stored on hospitals’ or healthcare institutes’ data storage, this is why developers and manufacturers have a bigger responsibility than ever to assure IoMT device security. This article provides a complete guide to Internet of Medical Things devices security, from product design through a vulnerability assessment.
Besides it introduces CCLab, our agile and experienced cybersecurity lab that provides comprehensive services to support manufacturers and developers in preparing and evaluating their Internet of Medical Things devices for the related cybersecurity standards.
Before delving into IoMT cybersecurity, it is important to clarify what the Internet of Medical Things actually is. Internet of Medical Things is a network of interconnected devices and applications that utilize internet-enabled connectivity to collect, transmit, and analyze patient health data.
IoMT is a subcategory of the consumer Internet of Things (IoT) in the healthcare sector that utilizes sensors to remotely monitor and communicate with patients, effectively storing and analyzing their data. Its real-time patient information monitoring improves data accuracy, providing numerous benefits to patients. Additionally, it reduces healthcare costs while enhancing operational efficiency.
Internet of Medical Things devices includes:
Overall, the adaptability and convenience of Internet of Medical Things devices are transforming healthcare delivery, making it more accessible, patient-centered, and efficient.
Medical devices and IoMT devices share the use of technology to enhance healthcare. There are, however, significant differences between the two. Medical devices are mainly utilized in hospitals or other clinical settings and must be operated by a healthcare expert. Infusion pumps, ECG machines, and blood glucose monitors are examples of smart medical devices.
Another important difference is that medical device manufacturers must comply with stricter regulations in order to receive the CE mark on their products, which is one of the conditions for placing them on the market in the EU. One of these is that the given medical device has to comply with MDR/IVDR Cybersecurity Regulations.
The MDR/IVDR cybersecurity regulations aim to protect the reliability and security of professional medical devices by addressing possible cybersecurity risks. These regulations compel medical device manufacturers to establish necessary steps to secure their devices against cyber attacks, as well as to offer continuing upgrades and maintenance. Compliance with these standards is essential in the healthcare business to avoid security breaches, ensure patient security, and maintain regulatory compliance.
At CCLab we provide conformity assessments for multiple standards related to medical devices’ cybersecurity resilience.
The fast expansion of Internet of Medical Things devices has raised cybersecurity concerns and various security vulnerabilities that must be addressed.
Numerous IoMT devices lack adequate security upgrades, authentication procedures, and suitable encryption measures making them vulnerable to cyber-attacks. This is particularly worrying since the Internet of Medical devices collects massive amounts of highly-sensitive data including personal health information, biometric data, and location data, which cybercriminals potentially can use for identity theft or targeted attacks.
The interconnected nature of the Internet of Medical Things devices also creates a risk of cascading failures, where a single compromised device can lead to the malicious attack of an entire network of devices. IoMT devices are frequently integrated into healthcare facility systems operated by multiple suppliers, making it difficult to coordinate security measures across different platforms. This fragmented approach to cybersecurity may result in security flaws increasing the risk of data loss or cyber attack.
Another possible risk is the human factor. Doctors, nurses, patients, and other end users may raise security risks and vulnerabilities by failing to follow correct security policies or using weak passwords.
While there are some cybersecurity standards and guidelines for Internet of Medical Things devices, there is no single comprehensive set of standards that all manufacturers are required to follow. Regardless of that, IoMT manufacturers are still responsible for complying with the available standards and guidelines and implementing measures to ensure their devices are secure.
Learn more from our previous article about why Internet of Medical Things cybersecurity is more important than ever.
Manufacturers have a crucial responsibility in securing the Internet of Medical Things. This involves complying with related cybersecurity standards, improving authentication protocols, user education, and implementing security updates and patches to prevent cyber attacks. Complying with internationally recognized standardized cybersecurity measures, such as ETSI EN 303 645, also plays an essential role in ensuring the security of Internet of Medical Things devices.
ETSI EN 303 645 is the first internationally applicable cybersecurity standard for consumer IoT devices, including the Internet of Medical Things. It offers manufacturers a framework for improving device security and mitigating cybersecurity threats. The standard not only provides instructions for device security but also includes suggestions for managing security threats. This includes identifying and analyzing risks, adopting controls to minimize those risks, and regularly monitoring the risks to assure continued protection.
By adhering to the requirements outlined in ETSI EN 303 645, manufacturers can take a proactive approach to secure their devices and defend against possible attacks, eventually lowering the risk of data breaches and other security issues.
Doctors
Compliance with the ETSI EN 303 645 standard is beneficial for IoMT manufacturers for various reasons. To begin, the ETSI evaluation process supports manufacturers in identifying and mitigating security flaws in their products before they are distributed to the market. This helps to limit potential data breaches and security risks, which could be costly both financially and in terms of reputational harm post-release.
Besides that having ETSI-compiled devices can help the Internet of Medical Things manufacturers to build trust in end-users in their products as people are increasingly concerned about the security of the devices they use, especially the ones that store and transmit highly sensitive data.
Furthermore, establishing standardized cybersecurity measures when designing the IoMT devices can decrease development and testing costs by easing the process of introducing security features into products.
In order to get your IoMT device ETSI EN 303 645 certified you need to complete multiple steps.
First of all, you must implement the requirements defined by the ETSI 303 645 standard in your device or devices that you are planning to certify. The standard includes 33 cybersecurity requirements and 35 recommendations grouped over 13 categories:
There is multiple documentation that has to be prepared and provided for your IoMT device assessment.
After completing the above steps, the assessment can begin. In this step, an accredited cyber security laboratory evaluates your Internet of Medical Things product against the requirements defined in the ETSI EN 303 645 standards and then issues an evaluation report on the results.
If, based on the result of the evaluation, your product complies with the standard, the laboratory issues a statement of conformity for your Internet of Medical Things device which is a good base for further ETSI certification.
If you are looking for a professional and experienced laboratory for your IoMT device cybersecurity project, then CCLab could be the right partner for you. With our agile methods and comprehensive knowledge, we provide you with a broad solution for the entire ETSI EN 303 645 conformity process.
We provide professional workshops, training, and consultancy to guide you through and get your product ready for the evaluation process. CCLab can support your ETSI EN 303 645 documentation needs by providing you the templates of the DUT Identification, ICS, and IXIT, with guidelines on how to fill them out.
Our assessment involves a thorough examination of the products to identify any variances between the existing security implementation and the requirement outlined in ETSI EN 303 645.
We conduct a comprehensive assessment of your IoMT product to determine its compliance with the relevant provisions of ETSI EN 303 645. Subsequently, we provide you with a detailed conformance evaluation report, which includes any identified security gaps.
We provide a Statement of Conformity for your evaluated product when it's in compliance with the standards and requirements set forth in ETSI EN 303 645.
If you have any additional inquiries or concerns regarding cybersecurity and assessment of the Internet of Medical Things, please do not hesitate to reach out to us. Our team is readily available to assist you.
The healthcare industry is going through considerable technology developments, notably the Internet of Medical Things, which has allowed real-time remote patient monitoring and care. Improved patient care and comfort are supported by IoMT, however, it has heightened concerns about cybersecurity risks and potential data breaches. Manufacturers and developers of Internet of Medical Things devices have a significant responsibility for ensuring the security of their devices in order to avoid potential cyberattacks and secure patients' sensitive health data.
Compliance with related cybersecurity standards is critical for the security of IoMT devices and the patient data they store. ETSI EN 303 645 is one of the standards that manufacturers and developers should consider to comply their IoMT devices with. Going through the evaluation process allows manufacturers to be proactive in protecting their devices and lowering the possibility of data breaches and other security concerns.
It is not only the responsibility of manufacturers and developers to ensure the security of IoMT devices, but it also helps them by increasing trust in their products, which raises their market value.
Download our ETSI EN 303 635 infographics today and learn about the product certification process for this consumer IoT device cybersecurity standard.
Want to understand the MDR, IVDR regulation? Download our e-book on the latest requirements of medical cybersecurity
Read and learn more about the Radio Equipment Directive (RED), download our free material now.
As cyber threats become more sophisticated, businesses are compelled to implement rigorous protection strategies to stay compliant and secureCertification labs, like CCLab, play a crucial role in supporting businesses with expert testing, assessment and comprehensive compliance services, and specialized training. These labs offer services ranging from security audits to penetration testing, ensuring businesses remain resilient against evolving cyber threats while meeting regulatory standards. This article explores the indispensable role of certification labs, highlighting how they enhance cybersecurity, ensure compliance, and support a safer digital landscape.
9
min reading time
In an era where digital threats grow in complexity and frequency, cybersecurity is no longer a secondary consideration but an essential part of manufacturing operations. Compliance with security standards offers manufacturers a structured approach to managing the growing risks of digital threats and securely handling sensitive data. Compliance also helps companies meet industry regulations, protect intellectual property, and avoid potentially devastating financial losses.
8
min reading time
The rise of the Internet of Things (IoT) has revolutionized how we interact with technology. Consumer IoT devices are now deeply integrated into the fabric of modern life, from smart home appliances, wearable gadgets, and connected vehicles to health monitors and voice assistants. However, the increased connectivity provided by consumer IoT products also introduces a broader attack surface for cyber threats.
8
min reading time