February 12, 2016 By Rick M Robinson 3 min read

Connected devices — from regular smartphones to specialized gadgets such as fitness trackers — are storming the world of health care on multiple fronts, transforming everything from the mechanics of health records and payment processes to how people track their own health and seek care when needed.

The changes are transformative: Enterprises and the public stand to benefit from a revolution in health care. But the emergence of connected mobile devices will also pose new security challenges. Staying in front of these challenges will be absolutely critical for enterprises that hope to break into the vast new market of connected devices for health care.

Health Care Finally Goes Online — and Mobile

The current rapid transformation of the health information landscape, as outlined by PwC’s “Top Health Industry Issues of 2016,” has been a long time coming.

For years, the health sector lagged when it came to information technology. The reasons for this ranged from the fragmentation of the industry to the work habits of medical professionals. For example, desktop or even laptop computers were a poor fit for professionals that do much of their work on their feet caring for patients.

Mobile technology has broken through this barrier by providing tools suitable for a clinical work setting, but mobile connected devices are also transforming medicine in other ways. Many of these potential capabilities are in the hands of patients, who can now monitor their health on the go and seek care or information wherever they are.

Reshaping the Boundaries of Health Care

These connected devices are not even necessarily medical in the formal sense. Wearable fitness trackers and related devices, for example, are one of the first big growth areas for the Internet of Things (IoT).

Most are aimed at generally health-conscious consumers, not specifically medical patients. But any gadget that monitors heart rate and blood pressure is gathering information that a doctor might like to know. The line between strictly medical devices and broader health-minded products is breaking down.

And health care is being transformed by connected devices in other respects. Walgreens, for example, provides an app that allows users to manage prescriptions, set medication reminders and order refills. That’s just the tip of the iceberg for the company’s mobile health initiatives, however: It also announced that its apps will soon support telehealth capabilities and reward users for actions such as checking glucose levels.

Connected Devices Pose Security Challenges

These new technologies promise to transform health care in major and positive ways, making more information more readily available. But they also are bringing medical information security concerns to the forefront. The old clipboard-centric world of medicine made information fragmented, but at least what wasn’t online couldn’t be hacked.

Making information available makes it potentially vulnerable. This is the core security challenge that enterprises looking for opportunities will need to keep in mind. The challenge applies even to organizations that haven’t thought of themselves as firmly in the health care sector at all.

Think again about exercise monitoring devices: The people who buy them, who may be in robust health, probably don’t think of themselves as patients at all. Likewise, the vendors probably are not thinking about patient confidentiality. But they should because those devices are providing a treasure trove of health data. In the right hands it could save lives; in the wrong hands it could be abused.

Just to make things even more complex and challenging, security standards and best practices for the IoT are still in their infancy. The art of properly securing connected devices remains a work in progress.

Enterprises in the health care space, whether formally or informally, will do best if they absorb basic principles of good security, such as building in security throughout the development process rather than trying to bolt it on afterwards. This will not only safeguard customers, but also help new technologies to take hold and mature for the benefit of everyone’s health.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today