The Challenge of Securing Healthcare IoT Devices

The Proliferation of IoT in Healthcare Is Posing a Massive Risk
Mark Baik and Minakshi Sehgal, Palo Alto Networks

Healthcare devices pose a huge risk to organizations and their patients, as they often ship with vulnerabilities, run unsupported operating systems, are difficult to patch and lack encryption in communication.

Mark Baik, a healthcare security architect, and Minakshi Sehgal, a senior product marketing manager for IoT security, both at Palo Alto Networks, say some of the most commonly found unsecured pieces of medical equipment "are in vitro devices, imaging systems, patient monitoring systems, and some of the older gateway devices for medical equipment."

In this video interview with Information Security Media Group, Baik and Sehgal discuss:

  • The risks involved with the proliferation of IoT devices in healthcare;
  • Improving the security of IoT or IoMT devices;
  • How healthcare organizations are addressing this issue.

Mark Baik is a healthcare security architect with Palo Alto Networks. Before that, he spent most of his career in healthcare delivery and research organizations as a security practitioner with responsibilities spanning infrastructure, information security and enterprise architecture.

Minakshi Sehgal is a senior product marketing manager for IoT security with Palo Alto Networks. She has experience in product storytelling, strategy, positioning, marketing operations and sales enablement.


About the Author

Doug Olenick

Doug Olenick

Former News Editor, ISMG

Olenick has covered the cybersecurity and computer technology sectors for more than 25 years. Prior to his stint as ISMG as news editor, Olenick was online editor for SC Media, where he covered every aspect of the cybersecurity industry and managed the brand's online presence. Earlier, he worked at TWICE - This Week in Consumer Electronics - for 15 years. He also has contributed to Forbes.com, TheStreet and Mainstreet.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.