Alongside a dedicated team of medical device cybersecurity experts, GE Healthcare provides a holistic approach to managing product cybersecurity. From initial product design and development to optimization and maintenance throughout a device’s lifecycle, we help to ensure your medical devices are more secure so you can deliver patient care that is seamlessly connected and continuously protected.
Bringing threats to light
The earlier we protect a device, the better we can help stop data breaches that can profoundly impact an organization’s productivity, finances, quality of care, and reputation.
Data 29 million records breached in 20201
Systems 82% of hospital tech experts reported a data breach in 20182
Workflow Nearly 10 days of downtime per attack3
Cost The average healthcare breach costs $7 million to resolve4
Secure product development
Design Engineering Privacy and Security (DEPS) is our thorough secure product design and development process, following a rigorous set of principles that guide us through all stages of product development, testing, and preparation for the market.
Address findings
Assessment findings are reviewed by the cybersecurity team, and are either fully addressed prior to release, or in rare cases with lower associated risks any residual risk is formally risk-accepted and documented.
Design phase
During early development, we determine what the product or solution architecture will be based on its intended function, how it will be used, and what environment it will operate in.
Formal documentation
Prior to release to the market, documents are created to describe any deployment-related controls for the customer to implement. A standardized hand-off of residual risk is a formal part of this documentation.
Full threat assessment
Performed based on initial design and operating environment using industry standard threat models that specifically tailored to the clinical environment in which a device operates.
Quality management system checkpoints
Throughout the development process, control implementation is continuously monitored and controlled.
Final development stages
Manual review, vulnerability scans, static and dynamic code analysis, and several phases of internal and external penetration testing are all performed to ensure full implementation and help secure our products throughout their lifecycle.
Security controls
Preventing breaches begins with building strong cybersecurity controls into our imaging devices and securing every new product by design the day it arrives at your hospital—protecting your organization from the very start. Here’s how we help prevent some of the most common cybersecurity risks.
Lifecycle management
Ongoing cybersecurity protection with Continuity
Available as a separate purchasable option through your service contract, Continuity™ delivers ongoing operating system updates, system software upgrades, and cybersecurity patches to help ensure your devices stay current throughout their lifecycle.
Resources
Contact us to learn more
Discuss your cybersecurity challenges with a GE Healthcare expert today.