{"id":1191,"date":"2023-09-15T08:16:13","date_gmt":"2023-09-15T06:16:13","guid":{"rendered":"https:\/\/www.bayoomed.com\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/"},"modified":"2024-07-10T15:57:29","modified_gmt":"2024-07-10T13:57:29","slug":"the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/","title":{"rendered":"The foundation of cybersecurity: How we can protect medical devices in the digital era"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>In times of rapid technological progress and digital transformation, the topic of cybersecurity is becoming increasingly important. Medical devices and medical treatment environments are also increasingly becoming the focus of hackers, as the annual situation report of the german Federal Office for Information Security (BSI) shows.<\/p>\n<p>But what about the security of medical devices? Here, studies such as ManiMed and eCare show a frightening picture. It is to be feared that it is only a matter of time before direct attacks on medical devices claim their first victims.<\/p>\n<p>In this article, I aim to emphasize the key reasons why the following elements\u2014overview, skills, communication, security by design, documentation, and efforts \u2014are vital for effective cybersecurity processes during product development:<\/p>\n<\/div><ul style=\"--awb-item-padding-bottom:30px;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-search fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av_iconlist_title iconlist_title \"><strong>Overview<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<p>Digital medical products are becoming increasingly complex, which also increases the chances for potential cyber-attacks. A comprehensive understanding of one\u2019s own system, including its components, interfaces, and data flows, is essential to identify and address potential vulnerabilities before they can be exploited by potential attackers.<\/p>\n<p>SBOMs also enable automated security vulnerability assessments of implemented components. Only those who know their product can secure it.<\/p>\n<\/div>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-user-friends fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av-special-heading-tag \"><strong>Skills<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<p>To successfully address the challenges of cybersecurity, appropriate resources are required in the project. Cybersecurity experts with an understanding of current threat possibilities, attack methods, and preventive measures are indispensable to proactively respond to potential risks in medical product development and to develop effective security strategies. Because complex countermeasures are not synonymous with secure countermeasures.<\/p>\n<\/div>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bullhorn fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av_iconlist_title iconlist_title \"><strong>Communication<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<div class=\"flex_column av_four_fifth flex_column_div av-zero-column-padding first avia-builder-el-20 el_before_av_one_fifth avia-builder-el-first \">\n<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p>When it comes to cybersecurity, fast and direct communication within product development is of great importance. Knowledge about the medical device is scattered, especially when it is a medical treatment unit with several different components.<\/p>\n<p>Cybersecurity must be thought of across systems and requires appropriate clarification. The development of a secure product can only be successful if the development teams work together with cybersecurity experts and cybersecurity is implemented in the overall context of the product.<\/p>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-rocket fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av_iconlist_title iconlist_title \"><strong>Security By Design<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<p>The form of security measures is already of fundamental importance in the development phase of applications, products and services. Security by design ensures that security aspects are considered in the design from the outset in order to minimize vulnerabilities and avoid potential security gaps for cyber-attacks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-book fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av_iconlist_title iconlist_title \"><strong>Documentation<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<p>Careful, complete and structured documentation of all identified vulnerabilities and countermeasures is essential for clean documentation. There is always a way to counter identified risks. But what was not documented was never discussed.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-clock fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<div class=\"iconlist_content_wrap\">\n<header class=\"entry-content-header\">\n<p class=\"av_iconlist_title iconlist_title \"><strong>Efforts<\/strong><\/p>\n<\/header>\n<div class=\"iconlist_content \">\n<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p>Cybersecurity is not a one-time activity, but a continuous process that spans the entire product lifecycle. And with product lifecycles in the medical environment of more than 15 years, there is a lot to consider. Just think about the state of the art at the time. The first iPhone was just coming to market.<\/p>\n<p>Cybersecurity must be planned and managed as an effort in the project, because if you invest in cybersecurity, you invest in the future of your product.<\/p>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-margin-top:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:calc( 100% + ) !important;max-width:calc( 100% + ) !important;margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-left-medium:0px;--awb-width-small:25%;--awb-order-small:0;--awb-spacing-left-small:0px;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-row fusion-flex-align-items-center\"><div class=\"fusion-image-element \" style=\"--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:200px;\"><img decoding=\"async\" width=\"1080\" height=\"1080\" title=\"Sebastian-Wittor_Cybersecurity-Expert\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2023\/11\/Sebastian-Wittor_Cybersecurity-Expert-e1699094877401.png\" alt class=\"img-responsive wp-image-1137\"\/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-left:20px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-width-small:75%;--awb-order-small:0;--awb-spacing-right-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-color:var(--awb-color8);\"><p><strong>Sebastian Wittor<br \/>\n<\/strong>Cybersecurity Expert<strong><br \/>\n<\/strong><\/p>\n<p>Sebastian Wittor is cybersecurity expert at BAYOOMED and has been supporting our customers in the secure development of their medical devices as Project Manager Medical Engineering for over three years.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"author":5,"featured_media":2172,"template":"","categories":[82,48],"class_list":["post-1191","news","type-news","status-publish","has-post-thumbnail","hentry","category-cybersecurity-en","category-editorial-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The foundation of cybersecurity: How we can protect medical devices in the digital era - BAYOOMED<\/title>\n<meta name=\"description\" content=\"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The foundation of cybersecurity: How we can protect medical devices in the digital era\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T13:57:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/01\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/\",\"name\":\"The foundation of cybersecurity: How we can protect medical devices in the digital era - BAYOOMED\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/01\\\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg\",\"datePublished\":\"2023-09-15T06:16:13+00:00\",\"dateModified\":\"2024-07-10T13:57:29+00:00\",\"description\":\"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/01\\\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/01\\\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg\",\"width\":1366,\"height\":768,\"caption\":\"BAYOOMED - Cybersecurity: So sch\u00fctzen Sie Medizinprodukte\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The foundation of cybersecurity: How we can protect medical devices in the digital era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The foundation of cybersecurity: How we can protect medical devices in the digital era - BAYOOMED","description":"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/","og_locale":"en_US","og_type":"article","og_title":"The foundation of cybersecurity: How we can protect medical devices in the digital era","og_description":"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/","og_site_name":"BAYOOMED","article_modified_time":"2024-07-10T13:57:29+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/01\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/","url":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/","name":"The foundation of cybersecurity: How we can protect medical devices in the digital era - BAYOOMED","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/01\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg","datePublished":"2023-09-15T06:16:13+00:00","dateModified":"2024-07-10T13:57:29+00:00","description":"Cybersecurity for medical devices: Six aspects that are essential for effective security processes in product development.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/01\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/01\/BAYOOMED-Cybersecurity-So-schuetzen-Sie-Medizinprodukte.jpg","width":1366,"height":768,"caption":"BAYOOMED - Cybersecurity: So sch\u00fctzen Sie Medizinprodukte"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/the-foundation-of-cybersecurity-how-we-can-protect-medical-devices-in-the-digital-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"The foundation of cybersecurity: How we can protect medical devices in the digital era"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/1191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/2172"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=1191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=1191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}