{"id":872,"date":"2024-05-28T11:56:25","date_gmt":"2024-05-28T11:56:25","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=872"},"modified":"2024-05-29T11:56:02","modified_gmt":"2024-05-29T11:56:02","slug":"medical-device-cybersecurity-rising-threats-and-protective-measures","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/","title":{"rendered":"Medical Device Cybersecurity: Rising Threats and Protective Measures"},"content":{"rendered":"<p><b>Medical Device Cybersecurity: Rising Threats and Protective Measures<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the digital age, connected medical devices have revolutionized patient care, offering enhanced diagnostics, real-time monitoring, and improved treatment outcomes. However, the integration of these devices into the healthcare ecosystem has also introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.<\/span><\/p>\n<p><b>The Landscape of Connected Medical Devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Connected medical devices encompass a wide range of equipment, from wearable health monitors and infusion pumps to implantable cardiac devices and imaging systems. These devices collect and transmit critical health data, facilitate remote monitoring, and enable advanced therapeutic interventions. The proliferation of the Internet of Medical Things (IoMT) has made healthcare delivery more efficient but has also exposed new attack surfaces for cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Major Cybersecurity Vulnerabilities<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Lack of Standardized Security Protocols<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Many connected medical devices are developed without standardized security protocols. Manufacturers often prioritize functionality and speed to market over security, leading to devices with inadequate encryption, authentication, and access controls.<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> Outdated Software and Firmware<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Traditionally, medical devices have replacement schedules based on mean times for component failures, and not on cybersecurity concerns. This has led to the continued use of vulnerable legacy devices, that if exploited could lead to negative patient outcomes. Medical devices frequently run on outdated software and firmware, which may not be regularly updated or patched. Many medical devices can be used for more than a decade and may use operating systems that no longer receive updates or patches. For example, Microsoft ended support for Windows 8.1 on January 10, 2023, and recommends that users upgrade to Windows 11 to reduce risks to legacy systems that can harbor known vulnerabilities that cybercriminals can exploit.<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Weak Network Security<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The integration of medical devices into hospital networks can create vulnerabilities if those networks lack robust security measures. Insufficient network segmentation and the use of unsecured communication channels can allow attackers to move laterally within the network, gaining access to sensitive devices and data.<\/span><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> Insufficient User Training<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Healthcare personnel may not receive adequate training in cybersecurity practices, making them susceptible to phishing attacks and social engineering tactics. Human error remains a significant factor in many cyber incidents involving medical devices.<\/span><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> Supply Chain Risks<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The supply chain for medical devices often involves multiple third-party vendors, each with varying levels of cybersecurity maturity. A single compromised supplier can introduce vulnerabilities across numerous devices and systems.<\/span><\/p>\n<p><b>Notable Cybersecurity Incidents<\/b><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Medtronic Insulin Pump Vulnerability<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In 2019, vulnerabilities in Medtronic\u2019s MiniMed insulin pumps were discovered, which could allow unauthorized users to alter insulin delivery settings remotely. This prompted the FDA to issue a warning and recall affected devices, highlighting the severe risks associated with unsecured medical devices.<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> WannaCry Ransomware Attack<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The 2017 WannaCry ransomware attack significantly impacted the UK\u2019s National Health Service (NHS), disrupting hospital operations and affecting various medical devices. The ransomware exploited a vulnerability in outdated Windows operating systems, emphasizing the critical need for timely software updates and patches.<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Hospira Infusion Pump Flaws<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Hospira infusion pumps were found to have vulnerabilities that allowed attackers to remotely control drug dosages. The FDA issued multiple alerts about these security flaws, underlining the potential dangers of compromised therapeutic devices.<\/span><\/p>\n<p><b>Mitigation Strategies<\/b><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Implementing Robust Security Measures<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Manufacturers and healthcare providers must adopt comprehensive security measures, including end-to-end encryption, multi-factor authentication, and regular security audits. Incorporating security by design in the development phase can significantly reduce vulnerabilities.<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> Regular Updates and Patch Management<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Ensuring that all medical devices are regularly updated with the latest software patches and firmware updates is crucial. This practice helps mitigate known vulnerabilities and enhance device security.<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Network Segmentation and Monitoring<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Healthcare networks should be segmented to isolate medical devices from other systems, limiting the potential spread of malware. Continuous network monitoring can detect and respond to suspicious activities promptly.<\/span><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> Enhancing User Training<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Providing comprehensive cybersecurity training for healthcare personnel can reduce the risk of human error. Staff should be educated about the importance of cybersecurity, recognizing phishing attempts, and following best practices.<\/span><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> Strengthening Supply Chain Security<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Healthcare organizations should ensure that all third-party vendors adhere to stringent cybersecurity standards. Conducting regular security assessments and audits of suppliers can help identify and address potential vulnerabilities.<\/span><\/p>\n<p><b>Future Directions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">AI and Machine Learning<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Artificial intelligence (AI) and machine learning (ML) are emerging as powerful tools in cybersecurity. These technologies can analyze vast amounts of data to detect anomalies and predict potential threats, enhancing the protection of connected medical devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regulatory Enhancements<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regulatory bodies are increasingly focusing on medical device cybersecurity. The FDA, for instance, has issued guidelines emphasizing the need for a proactive approach to cybersecurity. Ongoing regulatory developments aim to establish more stringent requirements for device security throughout their lifecycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Industry Collaboration<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Collaborative efforts among healthcare providers, device manufacturers, and cybersecurity experts are essential to developing and implementing effective security strategies. Sharing threat intelligence and best practices can help the industry stay ahead of emerging threats.<\/span><\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Connected medical devices represent both a significant advancement and a critical vulnerability in modern healthcare. As cyber threats continue to evolve, the healthcare sector must prioritize cybersecurity to protect patient safety and ensure the integrity of medical data. By adopting robust security measures, staying vigilant, and fostering industry-wide collaboration, healthcare providers can mitigate the risks associated with connected medical devices and harness their full potential to improve patient outcomes.<\/span><\/p>\n<p><strong>Monitoring Remote Sessions<\/strong><\/p>\n<p>With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/p>\n<p>TSFactory\u2019s RecordTS v7 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\">Click here<\/a> to learn more about secure remote session recording.<\/p>\n<p><strong>Sources<\/strong><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2024\/03\/14\/medical-devices-cybersecurity-concerns\/\"><span style=\"font-weight: 400;\">https:\/\/www.helpnetsecurity.com\/2024\/03\/14\/medical-devices-cybersecurity-concerns\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.ama-assn.org\/practice-management\/sustainability\/how-prevent-data-breaches-medical-device-hacking-and-improve\"><span style=\"font-weight: 400;\">https:\/\/www.ama-assn.org\/practice-management\/sustainability\/how-prevent-data-breaches-medical-device-hacking-and-improve<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.iottechnews.com\/news\/2023\/dec\/18\/iot-tech-expo-cybersecurity-threats-medical-devices\/\"><span style=\"font-weight: 400;\">https:\/\/www.iottechnews.com\/news\/2023\/dec\/18\/iot-tech-expo-cybersecurity-threats-medical-devices\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/theinternetofthings.report\/Resources\/Whitepapers\/24333da0-6ee3-402c-993e-5503f09c05ec_ZingBox_WP_IoT-Guardian-for-the-Healthcare-Industry.pdf\"><span style=\"font-weight: 400;\">https:\/\/theinternetofthings.report\/Resources\/Whitepapers\/24333da0-6ee3-402c-993e-5503f09c05ec_ZingBox_WP_IoT-Guardian-for-the-Healthcare-Industry.pdf<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Medical Device Cybersecurity: Rising Threats and Protective Measures In the digital age, connected medical devices have revolutionized patient care, offering enhanced diagnostics, real-time monitoring, and improved treatment outcomes. However, the integration of these devices into the healthcare ecosystem has also introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs<\/title>\n<meta name=\"description\" content=\"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs\" \/>\n<meta property=\"og:description\" content=\"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-28T11:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T11:56:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/\",\"name\":\"Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg\",\"datePublished\":\"2024-05-28T11:56:25+00:00\",\"dateModified\":\"2024-05-29T11:56:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Medical Device Cybersecurity: Rising Threats and Protective Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs","description":"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/","og_locale":"en_US","og_type":"article","og_title":"Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs","og_description":"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2024-05-28T11:56:25+00:00","article_modified_time":"2024-05-29T11:56:02+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/","name":"Medical Device Cybersecurity: Rising Threats and Protective Measures - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg","datePublished":"2024-05-28T11:56:25+00:00","dateModified":"2024-05-29T11:56:02+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"The integration of medical devices into the healthcare ecosystem has introduced significant cybersecurity vulnerabilities. As more medical devices become interconnected and reliant on networked communication, the potential for cyberattacks increases, posing substantial risks to patient safety and data integrity.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/05\/medicaldevice.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/medical-device-cybersecurity-rising-threats-and-protective-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Medical Device Cybersecurity: Rising Threats and Protective Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":876,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/872\/revisions\/876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/874"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}