Top 5 mobile medical device security risks (according to the DHS)
Submitted By jryan@mcol.com, Created 07/22/2013 - 11:34
- Insider: The most common ways employees steal data involved network transfer, be that email, remote access, or file transfer
- Malware: These include keystroke loggers and Trojans, tailored to harvest easily accessible data once inside the network
- Spearphishing: This highly-customized technique involves an email-based attack carrying malicious attack disguised as coming from a legitimate source, and seeking specific information
- Web: DHS lists silent redirection, obfuscated JavaScript and search engine optimization poisoning among ways to penetrate a network then, ultimately, access an organization’s data
- Lost equipment: A significant problem because it happens so frequently, even a smartphone in the wrong hands can be a gateway into a health entity’s network and records
Source: National Cybersecurity and Communications Integration Center
Source URL: http://info.publicintelligence.net/NCCIC-MedicalDevices.pdf