HealthTech Protection

How healthcare breakthroughs could help cybersecurity

Blog HealthTech Protection

| 4 min read

Contact us

Many startups are achieving success by redefining how the economy works. Xtechs (financial, health, insurance, among others) are reducing operational costs and delivering more value to customers, by leveraging on computer science and advances in electronics. 3D printing, habit-tracking apps, cheap, precise and small measurement devices, and more, are just a few examples of what citizens and patients are using these days from so-called HealthTech. Additionally, within health centers new technology is supporting more efficient and effective practices. An explosion of new devices and interconnectedness is driving change to new levels. However, security threats have surrounded healthcare for years, and the emergence of HealthTech doesn’t mean fewer risks. Moreover, HealthTech might pose other significant challenges. A recent publication at Maturitas (Coventry & Branley, 2018) describes the cybersecurity challenges healthcare is currently facing. The potential economic exploitation of medical health records, the number of underprotected medical and non-medical devices, as well as the increasing complexity of the digitization of medical records calls for a more serious approach to cybersecurity in healthcare.

How to manage healthcare cybersecurity risks with this overload of interconnected devices and data? We believe organizations (specifically HealthTech companies) could learn from what has been innovative in healthcare management.

How doctors are improving performance in health centers

Atul Gawande, Source: https://commons.wikimedia.org/wiki/File:Atul-Gawande_%28cropped%29.jpg

Atul Gawande.

Here’s a short story: Atul Gawande, renowned surgeon and writer worked with the World Health Organization to address high mortality rates within intensive care units (ICUs). The finding: checklists reduced 40% in mortality in ICUs, according to the evidence. However, that’s only the medium by which the breakthrough solution was delivered. What was behind? In general, Gawande says the amount of knowledge and complexity nowadays makes our work very hard to be accomplished flawlessly, even when we know how to do things. In the specific case of medical professionals, he points to overconfidence and memory limitations from surgeons: they are pretty sure they know what they are doing. But they also are prone to forgetting some crucial elements in surgery, like instruments or procedures. As simple as it appears, checklists are tools for better performance in many contexts. In his words:

Checklists provide a kind of cognitive net. They catch mental flaws inherent in all of us – flaws of memory and attention and thoroughness. (Gawande, 2009)

Dr. Gawande has gone further to improve performance, not only in ICUs. He discussed the Morbidity and Mortality (M&M) conferences he runs in the Brigham and Women’s Hospital at The Knowledge Project podcast. These meetings are aligned to the work of Amy Edmondson in psychological safety (see for example Edmonson 1999; 2018). In brief, it is a safe space in which medical teams get together to discuss complications (cases that went wrong) within medical practice, including every death. The meeting is such that people attending are legally protected, that is to say, people cannot be attacked or removed from work by what they mention. In these meetings, medical teams discuss what could have been done differently to avoid the complications and how to ensure it doesn’t happen in the future. Making people feel safe to share about errors they made, for instance, in administering a higher dose of a drug to a patient with terrible consequences, has led to death rates falling quickly and faster recovery of patients. He also mentioned that, in general, the culture this practice has fostered is invaluable: people feel empowered and responsible, but also willing to take some risks when needed. For society, all these mean greater well-being.

How HealthTech could learn from healthcare

stethoscope and heart, Source: https://www.flickr.com/photos/71195909@N03/42743938785/

Stethoscope and heart.

We can see information and IT assets as patients cybersecurity teams look after. Similar to healthcare, cybersecurity, computer science, and software engineering enjoy and suffer at the same time from large amounts of knowledge. Just like in healthcare, “necessary fallibility” is also present in cybersecurity. That is, despite scientific advances and the knowledge humankind has developed, some efforts people pursue are “simply beyond” human capacity (for example, complete security). We will never know everything for sure, and this is the case in cybersecurity. As HealthTech goes mainstream, the potential perils of such increased complexity, interconnectedness, and knowledge should be addressed.

Get started with Fluid Attacks' DevSecOps solution right now

Healthcare, nonetheless, is showing us that even in “necessary fallibility” environments, there could be ways to perform better. Particularly, checklists might be translated into cybersecurity operations. At Fluid Attacks, we believe there is a clear link in what we do and how organizations benefit by better managing “fallibility”. HealthTech providers should be especially aware of how to ensure their developments provide reliable security for data and operations.

How Fluid Attacks approach helps improving business performance

We have one single offering: we attack your software. We breach IT systems flaws with superior effectiveness before others do, causing real harm.

We do this, in part, similar to what Dr. Gawande and his team found to lower mortality rates in ICUs: using checklists. However, we go some steps further:

  • We are capable of continuously hacking enterprise-level systems. This is like a smart checklist. As this is continuous, our services can detect small changes that could pose risks to your business. We rely on our automated products, so nothing is left out (like with a checklist). Also, we go deeper: our security engineers are the best-trained hackers. They think and work all the time on how your system’s flaws can be combined to configure attack vectors others cannot identify.

  • We automate almost everything we already know. Asserts is the product we have to assess how customers' systems are, quickly. It is like using a smart checklist, fed by all of our knowledge and experience.

  • All that we do gets stored, described, and tracked in our platform. This platform makes it easier for our customers to keep track of their security weaknesses as well as their fixes performed.

What about what Dr. Gawande calls M&M meetings? Well, the good news is that our approach makes you less likely to institute a version of the M&M meetings, as our work is proactive, not reactive. With us, you don’t have to wait to be hacked for real, and then discuss how to improve for the future. We help you to anticipate those complications, so you are better prepared, so you get more antifragile.

Do you want to share your thoughts? Do get in touch with us! We can help.

Subscribe to our blog

Sign up for Fluid Attacks' weekly newsletter.

Recommended blog posts

You might be interested in the following related posts.

Photo by James Lee on Unsplash

A lesson of this global IT crash is to shift left

Photo by CardMapr on Unsplash

Users put their trust in you; they must be protected

Photo by Wilhelm Gunkel on Unsplash

Transparency for fewer supply chain attacks

Photo by Sarah Kilian on Unsplash

Develop bank applications that resist DDoS attacks

Photo by Towfiqu barbhuiya on Unsplash

Ensuring compliance and security in the banking sector

Photo by Andre Taissin on Unsplash

With great convenience comes increased risk

Photo by FlyD on Unsplash

Software supply chain management in financial services

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.