Medical Device Hijacking

Med Jacking

Risk Assessment is the core requirement for achieving HIPAA Security compliance. This risk assessment tries to identify and mitigate sources for ePHI data loss in your network. While PCs, laptops, servers, PDAs, network printers and other network devices may be obvious points of failure, you should also include medical devices in your assessment.

Medical devices can be either wireless or wired. They can be broken down into four general categories: consumer health monitoring, wearable, embedded and stationary ...

Continue Reading