Skip to main content
NIHPA Author Manuscripts logoLink to NIHPA Author Manuscripts
. Author manuscript; available in PMC: 2019 Jul 29.
Published in final edited form as: Science. 2015 Mar 19;347(6228):1323–1324. doi: 10.1126/science.347.6228.1323-b

Cyber-attack risk low for medical devices

Zion Tsz Ho Tse 1,*,, Sheng Xu 2,, Isaac Chun-Hai Fung 3, Bradford J Wood 2
PMCID: PMC6663473  NIHMSID: NIHMS895437  PMID: 25792321

We concur with D. Clery (“Could your pacemaker be hackable?,” News, special section on The End of Privacy, 30 January, p. 499) that the U.S. Food and Drug Administration (FDA) has focused on reliability, safety, and efficacy for specific medical devices, with no targeted focus on protecting against malicious cyber attacks. Although cybersecurity is a legitimate concern, sensationalized fictional entertainment like the television series “Homeland” may exaggerate the real risks.

Health care practitioners, industry, and insurance payers follow regulations from the FDA, Department of Health and Human Services, Centers for Medicare and Medicaid Services, and the Code of Federal Regulations (CFR). Cybersecurity, as part of the FDA’s mandate for risk profile assessment (1, 2), should receive attention from device manufacturers, given that vulnerabilities could potentially lead to downstream issues with CFR or FDA guidelines (3).

Despite reports about their potential cybersecurity vulnerability (4), medical devices are rarely accessible for hackers to attack. Also, patients and doctors can always disable and overwrite the remote control option. Medical devices requiring occasional Internet access are rarely life-supporting equipment. Patient data is encrypted and transferred through a secured network with redundant securities and risk mitigation strategies (5).

Cybersecurity is a theoretical issue in interventional devices such as surgical robotics. The robotic da Vinci surgical systems are integrated into U.S. medical practice but are rarely connected to unsecured networks. Nevertheless, vulnerabilities may exist despite FDA clearance, as the “FDA allows devices to be marketed when the probable benefits to patients outweigh the probable risks” (1). The FDA assesses the incremental risk-benefit ratio and decides whether a new device is cleared, using the current technology as the standard. Risk profiling and failure modes are identified and defined by the FDA routinely, and tangible cybersecurity risks should perhaps be factored into that assessment, even if the risk is small.

Footnotes

Disclaimer/Acknowledgments: The views and opinions of authors expressed herein do not necessarily state or reflect those of the U.S. Government nor does it constitute policy, endorsement, or recommendation by the U.S. Government or National Institutes of Health (NIH). Reference U.S. Code of Federal Regulations or U.S. Food and Drug Administration for further information.

REFERENCES AND NOTES

RESOURCES