{"id":3758,"date":"2021-04-22T08:45:58","date_gmt":"2021-04-22T06:45:58","guid":{"rendered":"https:\/\/www.bayoomed.com\/?post_type=news&#038;p=3758"},"modified":"2024-07-10T15:56:12","modified_gmt":"2024-07-10T13:56:12","slug":"cyber-security-requirements-for-network-enabled-medical-devices","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/","title":{"rendered":"Cyber security requirements for network-enabled medical devices"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p>Digitalization and the associated trend towards networking is also an important topic for medical devices. The fast and convenient exchange of information is beneficial when analyzing the patient&#8217;s state of health, for example, and can improve the quality of treatment.<\/p>\n<p>These medical devices are used in areas that are considered safety-critical for patients. In addition, the transferred data is considered particularly worthy of protection on the basis of the GDPR. Not least with regard to audit procedures, it is important for manufacturers to pay particular attention to <a href=\"https:\/\/www.bayoomed.com\/en\/begleitprozesse\/cybersecurity\/\">cybersecurity <\/a>. Accordingly, issues relating to cyber security requirements for network-enabled medical devices and their protection are important topics.<\/p>\n<p>Such protection includes both technical and organizational measures. We give you an overview of both areas and present important points.<\/p>\n<p><em>from Sebastian Wittor<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Organizational measures<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p>Organizational measures describe protective measures that are implemented through instructions, procedures and practices. They serve to prevent potential attack opportunities and describe processes for dealing with known vulnerabilities.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Cybersecurity risk analysis<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-3\"><p>In order to fulfill the basic requirements of the currently valid directives for medical devices, a risk analysis must be prepared as part of the conformity assessment procedure. The risks identified there, which include cybersecurity, are analyzed, minimized and documented.<br \/>\nRisk analysis is a continuous process in which new potential attack vectors are identified during the course of development and how they are dealt with. The aim is to minimize the probability of safety risks occurring and to reduce their impact on patients and medical devices.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Life cycle of the medical device<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p>Cybersecurity plays an important role in the life cycle of a medical device. Essential questions about the software development process are asked right at the start of the planning and development of such a product. This involves deciding on specifications for secure implementation, the selection of trustworthy development tools and the implementation of control mechanisms, which can take the form of test sections (security gates) and system tests.<\/p>\n<p>The life cycle also regulates the handling of security-related issues in relation to product maintenance and known vulnerabilities after the product release. Relevant here are processes for detecting new potential attack vectors, regular checks for known vulnerabilities and all external subcomponents used, and questions about the product&#8217;s update policy.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Communication of vulnerabilities<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p>In addition to dealing with known vulnerabilities, it is also necessary to define how to communicate about them. This includes the establishment of communication channels, e.g. for reporting identified vulnerabilities, open communication of these vulnerabilities to users and the creation of contact options for cybersecurity-related questions.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"858\" alt=\"BAYOOMED - Organisatrische Ma\u00dfnamen zur Einhaltung von Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\" title=\"BAYOOMED &#8211; Organisatrische Ma\u00dfnamen zur Einhaltung von Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\" class=\"img-responsive wp-image-3755\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-200x143.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-400x286.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-600x429.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-800x572.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Technical measures<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>Technical measures include all software and hardware-based, implementable protective measures to safeguard the medical device against attacks by third parties. They deal with specific potential attack vectors and secure the medical device against them.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Securing network communication<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>The biggest attack vector for network-enabled medical devices is an attack on the communication channels and the associated data exchange and processing. An attacker has the possibility to read or manipulate this data. To secure the communication, an analysis is necessary first. The planning and technical implementation of data transmission is based on this. Data should be secured on the basis of the protection objectives, taking into account current protective measures and cryptographic procedures.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Preventing the disclosure of information<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-8\"><p>In addition to protecting data transmission, the medical device and host system must also be secured. System-based vulnerabilities allow attackers to obtain information about the communication and security features used, which can be used to attack this network connection.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Detection of attacks<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-9\"><p>Despite the use of current security standards and their conscientious implementation, potential attacks on unknown vulnerabilities cannot be ruled out. It is therefore advisable to implement a system for detecting potential attacks. It analyzes the use of the medical device and its communication channels. It also uses this data to detect irregularities that could indicate an attack. In addition to detection, this also serves to understand the course of an attack and its attack vector so that specific countermeasures can be initiated on this basis.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Ensuring basic functionalities<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-10\"><p>Medical devices should ensure their basic functionality even without an active network connection or in the event of a potential attack. The primary protection goal and therefore central to cybersecurity issues is to safeguard the health of patients.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Analysis to secure network communication<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-11\"><p>The most important questions at a glance:<\/p>\n<\/div><ul style=\"--awb-item-padding-bottom:30px;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-question fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Which communication channel is used (Bluetooth, network, Internet, &#8230;)?<\/strong><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-question fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>What data is transferred?<\/strong><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-question fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>What is the transmission direction of the data and signal flows?<\/strong><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-question fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>What effects can transferred data have on the target system and what risks can this pose for patients, users or third parties?<\/strong><\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_5 1_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:20%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-hand-holding-medical fas circle-yes\" style=\"--awb-circlecolor-hover:var(--awb-color4);--awb-circlebordersize:0px;--awb-font-size:70.4px;--awb-width:140.8px;--awb-height:140.8px;--awb-line-height:140.8px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:30px;--awb-padding-left:60px;--awb-padding-top-small:30px;--awb-padding-right-small:30px;--awb-padding-bottom-small:30px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-size:cover;--awb-border-radius:60px 60px 60px 60px;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-margin-bottom-large:60px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\" style=\"--awb-text-color:var(--awb-color1);\"><p>All new territory for you? We would be happy to analyze your products, establish cybersecurity risk management in your company or train colleagues in the development department.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-top:20px;--awb-margin-bottom:20px;--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;\" target=\"_self\" href=\"https:\/\/www.bayoomed.com\/en\/#contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact us now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"author":5,"featured_media":3757,"template":"","categories":[82,48,45],"class_list":["post-3758","news","type-news","status-publish","has-post-thumbnail","hentry","category-cybersecurity-en","category-editorial-en","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber security requirements for network-enabled medical devices<\/title>\n<meta name=\"description\" content=\"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security requirements for network-enabled medical devices\" \/>\n<meta property=\"og:description\" content=\"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T13:56:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/\",\"name\":\"Cyber security requirements for network-enabled medical devices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/06\\\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\",\"datePublished\":\"2021-04-22T06:45:58+00:00\",\"dateModified\":\"2024-07-10T13:56:12+00:00\",\"description\":\"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/06\\\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2024\\\/06\\\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"BAYOOMED - Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-security-requirements-for-network-enabled-medical-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber security requirements for network-enabled medical devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber security requirements for network-enabled medical devices","description":"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/","og_locale":"en_US","og_type":"article","og_title":"Cyber security requirements for network-enabled medical devices","og_description":"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/","og_site_name":"BAYOOMED","article_modified_time":"2024-07-10T13:56:12+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/","url":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/","name":"Cyber security requirements for network-enabled medical devices","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg","datePublished":"2021-04-22T06:45:58+00:00","dateModified":"2024-07-10T13:56:12+00:00","description":"Digitalization is also an important topic for medical devices. Manufacturers should pay particular attention to cybersecurity.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg","width":2000,"height":1333,"caption":"BAYOOMED - Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-security-requirements-for-network-enabled-medical-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Cyber security requirements for network-enabled medical devices"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/3758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/3757"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=3758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=3758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}