{"id":5463,"date":"2025-03-27T10:49:51","date_gmt":"2025-03-27T09:49:51","guid":{"rendered":"https:\/\/www.bayoomed.com\/?post_type=news&#038;p=5463"},"modified":"2025-03-27T11:24:54","modified_gmt":"2025-03-27T10:24:54","slug":"cybersecurity-fails-in-software-engineering-for-medical-devices","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/","title":{"rendered":"Cybersecurity fails in software engineering for medical devices"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:29px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p><strong>Author: Sebastian Wittor<br \/>\n<\/strong>Lead Cybersecurity Expert at BAYOOMED<\/p>\n<\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p>The digitalization of the healthcare sector is progressing rapidly. Medical apps, digital health applications<a href=\"https:\/\/www.bayoomed.com\/en\/entwicklung\/diga\/\">(DiGAs<\/a>) and software for medical devices are increasingly being used to monitor patients, support treatments and optimize clinical processes. However, the more widespread these technologies become, the greater the vulnerability to cyberattacks.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:-30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Cybersecurity as a key challenge in digital healthcare<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color);\">The consequences of <\/span><a style=\"font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color);\" href=\"https:\/\/www.bayoomed.com\/en\/begleitprozesse\/cybersecurity\/\">cybersecurity<\/a><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color);\">-Incidents in the healthcare sector can be serious: The theft of sensitive patient data, disruption of important medical processes or even tampering with vital equipment are just some of the possible scenarios. Last but not least, such security breaches can lead to legal consequences and a loss of trust &#8211; on the part of patients as well as regulatory authorities and business partners. <\/span><\/p>\n<p>Software as a medical device (SaMD) in particular is subject to stringent regulatory requirements. Even small security gaps can have serious consequences. What&#8217;s more, healthcare data is considered particularly sensitive personal data. In view of these risks, it is essential to make cybersecurity an integral part of the early development phase &#8211; and not just when the product is about to be launched on the market.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:-30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Top 10 cybersecurity fails in the software engineering of medical devices<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-margin-bottom:60px;\"><p>In the following, we take a look at the top 10 cybersecurity fails in the engineering of software for medical devices and provide practical examples to illustrate how easily errors can creep in and what consequences they can have.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED - Post-Market Cybersecurity, eine Notwendigkeit f\u00fcr Medizinproduktehersteller\" title=\"BAYOOMED &#8211; Post-Market Cybersecurity, eine Notwendigkeit f\u00fcr Medizinproduktehersteller\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller.jpg\" class=\"img-responsive wp-image-5311\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Post-Market-Cybersecurity-eine-Notwendigkeit-fuer-Medizinproduktehersteller.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>1. lack of consideration of cybersecurity in product planning<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">The topic of cyber security is often only mentioned in passing at the start of a project or is seen as a later &#8220;finishing touch&#8221;. As a result, there is a lack of defined security requirements and corresponding budgets at an early stage.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A manufacturer of medical monitoring devices is planning a new generation of devices, but is neglecting security features in the core architecture. Initial penetration tests show that a fundamental redesign is required to adequately secure the devices. This significantly delays the product launch and leads to high additional costs.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>2. insecure authentication and authorization procedures<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-2 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Default passwords, a lack of two-factor authentication (2FA) or the absence of role-based access rights make it easier for attackers to penetrate systems.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A DiGA that analyzes patients&#8217; vital signs and transmits them to the doctor uses a simple password procedure without 2FA. An attacker thus gains access to the health data and exposes serious security gaps. The application then has to be taken offline for weeks in order to retrofit security measures and analyze the damage.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>3. unencrypted or weakly encrypted data transmission<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-3 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:30px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">If sensitive data such as patient data or device information is transmitted unencrypted or only weakly encrypted over the network, it is an easy target for man-in-the-middle attacks.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A hospital uses a cloud-based patient data management system that uses encryption algorithms, some of which are insecure. An external security team quickly decrypts passwords and personal data to gain access to patient records. Fortunately, this process is discovered in a test environment, but this reveals significant vulnerabilities.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED - Warum ist Post-Market Cybersecurity so essenziell\" title=\"BAYOOMED &#8211; Warum ist Post-Market Cybersecurity so essenziell\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell.jpg\" class=\"img-responsive wp-image-5315\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Warum-ist-Post-Market-Cybersecurity-so-essenziell.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>4. inadequate protection of personal health data<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-4 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">In many medical applications, sensitive patient data is only superficially secured. A lack of encryption or inadequate access controls ensure that unauthorized persons can access this data relatively easily. This omission leads to an increased risk of data protection breaches and potentially serious legal consequences.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>A provider of a digital health application (DiGA) stores all recorded patient data in a central database without implementing appropriate access and encryption mechanisms. An attacker then analyzes the data traffic and gains access to the user accounts. This allows him to read not only personal information, but also specific health data, resulting in massive data disclosure. When the incident came to light, the provider had to inform both those affected and the relevant data protection authorities and make extensive improvements to prevent further breaches.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>5. irregular or missing security updates<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-5 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>In many medical applications, the regular installation of security updates &#8211; for example for the operating system or third-party libraries &#8211; is neglected. This results in open doors for hackers.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Medical software for analyzing image data runs on an outdated operating system for which no security patches have been provided for years. Only an active attack that paralyzes the image analysis station forces the company to switch to an up-to-date system, which entails expensive and time-consuming adjustments.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>6. lack of validation of manual entries and transmitted data<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-6 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:30px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>In many medical software projects, the verification of user or system input is neglected. If unvalidated data is used directly in critical processes or databases, manipulation &#8211; for example through SQL injections or other code injection attacks &#8211; is often only a matter of time.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A medical portal accepts patient data and feedback forms, but only validates the entries superficially. An attacker enters specially prepared character strings in an input field and can thus infiltrate malicious code unhindered. The vulnerability allows him to access sensitive patient data and change parts of the database. When the incident is discovered, the company has to revise its software, evaluate extensive log files and inform those affected &#8211; resulting in considerable costs and loss of reputation.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED - Best Practices f\u00fcr Post-Market Cybersecurity\" title=\"BAYOOMED &#8211; Best Practices f\u00fcr Post-Market Cybersecurity\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity.jpg\" class=\"img-responsive wp-image-5313\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/02\/BAYOOMED-Best-Practices-fuer-Post-Market-Cybersecurity.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>7. inadequate risk and vulnerability management<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-7 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Regular penetration tests and risk analyses are essential in the medical device sector. Those who fail to identify and rectify vulnerabilities at an early stage risk gaps in live operation.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A cloud-based medical documentation software is launched on the market without a comprehensive security analysis. Only when customers report strange behavior does an external cybersecurity analysis determine that attackers can gain access to all databases through an SQL injection. This omission leads to high recourse claims from customers.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>8. insecure interfaces (APIs)<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-8 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Modern software solutions often use external APIs or offer interfaces themselves. If these are not adequately secured, attacks have an easy time of it.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">A telemedicine app that forwards patient data to external clinics relies on a self-developed API with rudimentary authentication. A hacker uses automated test scripts and reads patient data in real time.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>9. insufficient logging and monitoring<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-9 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">If log files are inadequately configured or do not even exist, attacks often remain undetected for a long time. Important information for forensic analysis is also often missing.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">In medical cloud software, the log levels are set so low that general usage is logged, but no unusual login attempts. An accumulation of login failures remains undetected until a successful attack finally takes place. Subsequent analysis is made more difficult as no information about the attack path is available.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>10. vulnerabilities in external code due to missing SBOM<\/h3><\/h3><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-2 fusion-content-boxes-10 content-boxes-icon-with-title content-left\" style=\"--awb-iconcolor:var(--awb-color1);--awb-item-margin-bottom:0px;--awb-margin-bottom:30px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-times fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Fail<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Many software developers for medical devices rely on external components and open source libraries without creating a software bill of materials (SBOM). If there is no precise overview of the third-party components used, it is difficult to identify security gaps or outdated versions. This increases the risk of criticalities going unnoticed and ultimately being exploited by attackers.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:32px;width:32px;line-height:16px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:rgba(255,255,255,0);box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:32px;width:32px;line-height:32px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:16px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/span><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:var(--awb-typography1-line-height);\">Example<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>A telemedicine service uses an open source component that is responsible for transferring patient data. As the developers do not maintain an SBOM, a critical security vulnerability in this library goes unnoticed for months. It was only when attackers gained unauthorized access to the database and extracted personal health information that it became clear that the version of the software used had been classified as insecure for months. The company is now forced to inform both the people affected and the relevant authorities and to revise its entire software architecture in order to prevent new vulnerabilities of this kind.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-image-element \" style=\"--awb-aspect-ratio:3 \/ 2;--awb-object-position:67% 77%;--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none has-aspect-ratio\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1600\" height=\"800\" alt=\"BAYOOMED Softwareentwicklung - Wir entwickeln Deine Softwarel\u00f6sung\" title=\"BAYOOMED Softwareentwicklung &#8211; Wir entwickeln Deine Softwarel\u00f6sung\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung.jpg\" class=\"img-responsive wp-image-1911 img-with-aspect-ratio\" data-parent-fit=\"cover\" data-parent-container=\".fusion-image-element\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung-200x100.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung-400x200.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung-600x300.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung-800x400.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung-1200x600.jpg 1200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/02\/BAYOOMED-Softwareentwicklung-Wir-entwickeln-Deine-Softwareloesung.jpg 1600w\" sizes=\"(max-width: 1100px) 100vw, 1600px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Conclusion: &#8220;Security by design&#8221; pays off<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>The above examples clearly show how easily cybersecurity failures can creep in and what serious consequences they have in the healthcare sector. Particularly with medical applications &#8211; whether DiGAs, cloud-based hospital systems or software for medical devices &#8211; a single attack can have serious consequences, both for patients and for the companies involved.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Cybersecurity in the healthcare sector: Mandatory, not optional<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-6\"><p>It is therefore essential to include cybersecurity in the early design phase. This approach, often referred to as &#8220;security by design&#8221;, includes, among other things <\/p>\n<ul>\n<li><strong>Early risk analyses<\/strong> and threat models<\/li>\n<li><strong>Clear definition of security requirements<\/strong> and budget items for security<\/li>\n<li><strong>Regular security checks<\/strong> (penetration tests, code reviews, etc.) during the entire development process and before a release<\/li>\n<li><strong>Consistent product maintenance <\/strong>through vulnerability management and software updates, even after product launch<\/li>\n<li><strong>Establishing clear responsibilities<\/strong> and training measures to continuously expand the team&#8217;s expertise<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Security by design saves resources in the long term<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>It may initially seem more complex and expensive to invest in security mechanisms right from the start. However, the costs incurred afterwards for subsequent improvements, product recalls, claims for damages or reputation restoration are usually significantly higher. <\/p>\n<p>At a time when patient data is one of the most valuable assets for cyber criminals and healthcare facilities are repeatedly the target of ransomware attacks, cybersecurity should be considered a fundamental part of any healthcare software project. This not only strengthens the trust of patients and partners, but also ensures long-term competitiveness. <\/p>\n<p><strong>In short<\/strong>, those who consistently implement security by design benefit from better product quality, a higher level of compliance and a faster response to emerging threats. In this way, the risk of serious cybersecurity failures can be significantly reduced. But the really frightening thing is that all of the above-mentioned failures can be avoided relatively easily if you take care of them consistently and understand cybersecurity as an integral part of the entire development process.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_5 1_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:20%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-hand-holding-medical fas circle-yes\" style=\"--awb-circlecolor-hover:var(--awb-color4);--awb-circlebordersize:0px;--awb-font-size:70.4px;--awb-width:140.8px;--awb-height:140.8px;--awb-line-height:140.8px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:30px;--awb-padding-left:60px;--awb-padding-top-small:30px;--awb-padding-right-small:30px;--awb-padding-bottom-small:30px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-size:cover;--awb-border-radius:60px 60px 60px 60px;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-text-color:var(--awb-color1);\"><p>Are you facing cyber security challenges? Together we can develop tailor-made solutions that protect your medical devices in the long term. Let&#8217;s combine innovation with security.  <\/p>\n<p>Arrange an appointment for a non-binding initial consultation.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-top:20px;--awb-margin-bottom:20px;--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;\" target=\"_self\" href=\"https:\/\/www.bayoomed.com\/en\/#contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact us now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"author":5,"featured_media":5462,"template":"","categories":[82,45],"class_list":["post-5463","news","type-news","status-publish","has-post-thumbnail","hentry","category-cybersecurity-en","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity fails in software engineering for medical devices<\/title>\n<meta name=\"description\" content=\"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity fails in software engineering for medical devices\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T10:24:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/03\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"31 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/\",\"name\":\"Cybersecurity fails in software engineering for medical devices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/03\\\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg\",\"datePublished\":\"2025-03-27T09:49:51+00:00\",\"dateModified\":\"2025-03-27T10:24:54+00:00\",\"description\":\"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/03\\\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/03\\\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"BAYOOMED - Cybersecurity Fails in der Softwareentwicklung f\u00fcr Medizinprodukte\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-fails-in-software-engineering-for-medical-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity fails in software engineering for medical devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity fails in software engineering for medical devices","description":"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity fails in software engineering for medical devices","og_description":"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/","og_site_name":"BAYOOMED","article_modified_time":"2025-03-27T10:24:54+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/03\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"31 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/","url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/","name":"Cybersecurity fails in software engineering for medical devices","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/03\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg","datePublished":"2025-03-27T09:49:51+00:00","dateModified":"2025-03-27T10:24:54+00:00","description":"Cybersecurity Fails in Software Engineering for Medical Devices - Risks of Digital Health Solutions.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/03\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/03\/BAYOOMED-Cybersecurity-Fails-in-der-Softwareentwicklung-fuer-Medizinprodukte-1.jpg","width":2000,"height":1333,"caption":"BAYOOMED - Cybersecurity Fails in der Softwareentwicklung f\u00fcr Medizinprodukte"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-fails-in-software-engineering-for-medical-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity fails in software engineering for medical devices"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/5463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/5462"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=5463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=5463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}