Читать книгу Do No Harm - Matthew Webster - Страница 42
In Summary
ОглавлениеAll this said, as we have seen with Spectre and Meltdown in the previous chapter, vulnerabilities exist that nobody would have predicted. Even if a company is extremely diligent with its security, vulnerabilities can be found. They are inevitable even in the best of situations. That does not mean we should not strive for better. Too often, IoMT manufacturers use the excuse of ever-present vulnerabilities to not focus on the security of their products as much as they should. Again, this does not apply to every company, but unfortunately it applies to too many companies. As hospitals adopt IoMT technology in greater quantities, there will be a tipping point for security to become of greater importance than it currently is from a manufacturer's perspective.
In the end, both lives and data are important to protect. So far, we have been focusing on the technology. The data that comes out of that technology is also extremely important. The cost of a breach is heavily linked to the amount of data. All of these IoMT vulnerabilities inevitably lead to a loss of data. IoMT is causing a data explosion, and thus the risks for hospitals are greater than they ever have been—not just from IoMT devices, but also from the data they produce. We'll explore the data side of the equation in the next chapter.