Hacking Health: Cybersecurity in Medical Devices and Healthcare

By Audrey Lee

When you hear the term “Internet of things” (IoT), what is the first device that comes to mind? You might picture the smartphone you’ve come to heavily rely on, a fitness tracker that monitors your activity throughout the day, or even a smart home that is energy efficient. But even something as personal as an implantable medical device (such as an insulin pump or pacemaker) is becoming part of a rapidly growing number of network-connected devices.

We’re becoming more connected with the internet than ever before. Over the past two decades, computer software and internet connectivity capabilities have been incorporated into planes, cars, homes, and cities to improve the ways that we live and interact with the world around us. These devices have been influencing developments in major industries such as business and healthcare. In the latter case, they have driven advancements in technologies from medical imaging to wearable technologies.

According to some experts, by 2020 there will be over 200 billion connected things—an astounding 26 IoT objects for every human being on Earth! But as we grow more dependent on technology in our daily lives, we also become more vulnerable if the technology should fail. Just like computers connected to the internet, IoT devices are susceptible to security breaches. These attacks can be particularly scary, especially when they occur on medical devices.

For instance, think about what might happen if you rely on an insulin pump to manage diabetes. If a security breach compromises the functions of your pump, then your very life would be at risk. This hypothetical situation is actually very real: in 2016, Johnson & Johnson released a warning to patients about the vulnerability of one of its insulin pumps to cyber attacks. It was found that hackers could potentially exploit the device to deliver an overdose of insulin, resulting in life-threateningly low blood sugar. Although the FDA knows of no cases yet where hackers have exploited these devices to harm patients, these vulnerabilities still have (rightfully) raised considerable alarm.

Real cases of identity theft, ransomware, and targeted hacking have proven healthcare data and devices to be vulnerable. In 2016, a hacker seized control of the computer systems at Hollywood Presbyterian Medical Center, forcing the hospital to pay $17,000 ransom in bitcoin. Furthermore, in the case of targeted nation-state hacking, it has been shown that personal medical devices could be compromised to deliver lethal dosages to users. This topic was of great concern when former Vice President Dick Cheney had a cardiac pacemaker implanted. Cheney’s doctors needed to disable the wireless capability of his device because they feared someone could breach his pacemaker and deliver a deadly shock to his heart. The possibility of this attack was not only a risk to Cheney’s life but also a topic of concern that left an entire nation on edge—and it highlighted the danger that cyberattacks pose to the healthcare industry.

Cybersecurity is the protection of computer systems from attack, damage, or unauthorized access. It takes center stage in protecting us from the numerous and perilous risks that IoT devices possess. Unfortunately, the current state of cybersecurity in healthcare and medical devices is far from reassuring. According to the US Department of Health and Human Services’ (HHS) Task Force member Josh Corman, “What we consistently encountered was a strategic pitfall in cybersecurity environment. Healthcare cybersecurity is in critical condition.” In 2015, the healthcare industry experienced more breaches from cyberattacks than any other industry, emphasizing the grave danger cyberattacks pose—as well as the shortage of protection against them.

Despite the direness of the situation, many people are unaware of the facts on cybersecurity threats to medical devices. This lack of knowledge is a key obstacle for patients and healthcare workers who wish to push for change. For instance, misconceptions that the US Food & Drug Administration (FDA) conducts premarket tests of medical devices for cybersecurity for approval are false; device security testing is the responsibility of the medical product manufacturer. Since there are no regulations to enforce the security testing of medical devices, it becomes unclear whether the devices we receive as patients are truly safe to use. Moreover, many believe that cybercriminals only target large hospitals, but the HHS has found that all healthcare organizations are being targeted regardless of their size. This revelation is especially concerning due to the fact that three out of four hospitals—that is, the vast majority—do not have designated security persons for medical data. The misconceptions about cybersecurity in healthcare are driving a systemic and dangerous lack of action and regulation by institutions to protect patients.

On a positive note, regulatory agencies and governments have begun to address the deficiencies in the state of cybersecurity. In order to address the security needs of the healthcare industry, the Health Care Industry Task Force released a report to Congress in June 2017 outlining the flaws and necessary action items for improvement. Present challenges include the severe deficit of security personnel, equipment running on outdated operating systems, and unsecured personal medical devices that are presently used by patients. The Task Force set forth six imperatives along with recommendations for the healthcare industry to develop the security of medical devices and health IT, and improve knowledge of this issue through education initiatives. As a whole, this report addressed significant concerns and established an ongoing public-private forum to enhance protections for both the healthcare industry and its patients.

Along the same lines, the FDA has organized public workshops and formed partnerships to help protect the public health from cybersecurity vulnerabilities. It has also published guidelines and recommendations for medical device manufacturers and healthcare facilities to be more vigilant about identifying risks and hazards related to their devices, including cybersecurity. As of this year, the FDA has partnered with the National Science Foundation and the Department of Homeland Security to strengthen medical device cybersecurity through a public workshop. The recent outbreak of activity by these organizations to address these pressing issues is reassuring for the future of the IoT.

All said, it is important to keep in mind that there is much left to be done to protect the healthcare industry. Many medical devices on the market are still vulnerable to existing cyber threats, and existing devices will still be vulnerable to cyber threats if left unaltered. In the future, the private industry and the government must quickly acknowledge and tackle these vulnerabilities, and design and enforce proper regulations for the IoT as a whole.

Security threats to medical devices have been a widespread and integral topic of discussion in the cybersecurity field since the mid-2000s. However, it has taken over a decade for these concerns to be officially addressed in the healthcare industry. As technology continues to advance and proliferate in our everyday lives, it is critical that the public and private sectors work together to address cybersecurity concerns in order to maintain the welfare of patients, hospitals, and societies.

Audrey Lee is a Columbia Engineering sophomore studying biomedical engineering. She is a staff writer for the Columbia Science Review.

The Missing Piece of Misinformation

By: Audrey Lee
Edited by: Helena Rios

Every day, over three billion people lose themselves in a virtual reality. Most of them will send a Snap to friends, like a selfie on Instagram, or react angrily to a rant on Facebook. They return to the physical world only so they may attend to necessities and responsibilities such as school, work, and sleep, before resuming their trance in cyberspace.

Social media platforms are becoming increasingly popular as they enlarge and accelerate how we communicate. Since the launch of Facebook live a year ago, many of us have come to rely on the site to receive up-to-the-minute news and to watch live streams of monumental events. While many find Facebook to be a convenient and efficient news source, the ongoing controversy over its dissemination of fake news suggests that it may not be the most credible. The company is currently under fire for allowing misinformation to spread and for consequently misguiding its users’ perspectives and decisions.

Although many people claim that it is Facebook’s responsibility to correct this issue, the real solution lies not within the company’s developers or algorithms, but within us.

A key factor in how we develop as socially conscious individuals is how we experience, observe and reflect on real-world situations. As our awareness shifts from atoms to bits, we lose touch with our physical world and allow our consciousness to be influenced by our interactions in cyberspace. It is not surprising that the Internet and social media currently play dominant roles in our lives. When I received my first smartphone, I was instantly awestruck by the freedom I had to access the Internet from anywhere at any time. I no longer had to wait until I was in front of a computer to check my emails and read updates on world news. Now, I could receive reports and exchange messages on a connected mobile device almost immediately. Even when it comes to learning, much of what I wish to know comes from “just Googling it” quickly online.

While the Internet has made it more efficient for us to search for answers in the vast sea of information, it has also made us adopt a more shallow way of thinking. Instead of delving deeply into topics and learning from experience, we often read the first few articles in a search engine and simply accept that their authors know more than we do. Particularly in areas with which we are not that familiar, we simply believe whatever we read on what looks like a credible source. This shallow surfing in place of contemplative thinking has come to dominate not only our Internet searches but also our understanding of ourselves.

As social media networks pervade our daily lives, they not only affect the way we interact with others but also change the way we think and view ourselves in virtual and physical reality. In our lives on the screen, there are no limits to how many profiles we can create and how many background stories we can fabricate. Many people also tailor the descriptions of themselves to whatever would be popular and socially desirable online. For instance, Instagram posts can be easily rendered to attract more followers and headlines on digital news articles can be sensationalized to attract greater readership. While exaggerated media are not unique to the Internet, our online social networks have made it much easier to create and spread fake news like wildfire.

These virtual identities together with our constant contact with misinformation shape the ways we think about ourselves in real life. Self-identity, which used to be built upon real-life experiences, observations, and deep thinking, is now based on virtual experiences that can be rife with false misinformation and shallow understandings.

Although there is a tendency to point fingers at mainstream media platforms like Facebook and TV networks for media bias, it is important to realize that the onus is not on them to reform the way they operate. All social media and news media companies are simply doing what they’re meant to do: moving information across a global network regardless of whether the information is true or false. Ultimately, it is up to us as users to determine how much we allow our perceptions to be affected by these media. It is impossible for us to avoid the pervading effects of social media and the Internet in our society. However, we can balance their imact by maintaining a boundary between our internal awareness and external virtual influences.

In the Internet Age, where information and misinformation can be easily dispersed, it is up to our self-consciousness to determine the stability of our inner lives.

References
http://newsroom.fb.com/news/2016/04/introducing-new-ways-to-create-share-and-discover-live-video-on-facebook/
https://www.theguardian.com/technology/2016/dec/12/facebook-2016-problems-fake-news-censorship
http://web.mit.edu/allanmc/www/mcluhan.mediummessage.pdf
http://www.factcheck.org/2016/10/did-the-pope-endorse-trump/

Spread Science: The Zooiverse

Welcome to our new blog series, Spread Science, where we will detail a way for you to participate in and promote science. Hopefully, these organisations and projects will keep you entertained over the summer. This time, we are looking at the Zooniverse.

The Zooniverse is not one project, that wouldn’t be epic enough, it is five projects using the same platform and user accounts: Moon Zoo, Galaxy Zoo: Hubble, Solar Stormwatch, Galaxy Zoo: Understanding Cosmic Mergers and Galaxy Zoo: The Hunt for Supernovae. These projects allow you to catalogue and decipher the tons of data coming from telescopes around the world. All of these project would have been handled by undergrads in the past, but the Internet allows for free labor community involvement. It is hard to explain everything, so I’m going to post a few videos…

Moon Zoo

Moon Zoo: Boulder Wars from The Zooniverse.

Moon Zoo: Crater Survey from The Zooniverse.

Galaxy Zoo

Basically, all the projects work like the ones above. They are all super simple to use and you can spend hours cataloguing stuff. Head over to the zoo of space, read the directions and start helping astronomers today!