
By Nadia ElKaissi, CHTM

Picture this: The hospital wants to implement a medical technology that can upload the data to a server to allow clinicians to read results virtually. The vendor proposes a cloud solution as the best option to host the environment, with the justification being that the solution would remove any physical limitations and provide more options for expansion and accessibility. As healthcare technology manager (HTM) professionals, it is your role to evaluate the solutions and determine what is the best option for your hospital.
Cloud systems for medical devices have become an increasingly popular way to store and manage patient data. The technology has revolutionized the health care industry, providing a more efficient and cost-effective way to deliver patient care. Federal government agencies are even starting to migrate and adopt cloud-based solutions in their modernization strategies. One of the reasons the solution is gaining momentum is that it offers several benefits such as improved data accessibility, scalability and cost saving. However, like any technology, cloud solutions are not immune to vulnerabilities. It is necessary to ensure these solutions still follow the same security boundaries as any well-defined protected enterprise network.
Most cloud systems are software or services hosted on remote servers and are able to be reached anywhere with Internet connectivity. This is beneficial for health care providers as it allows access to patient data from any location and is easy to modify solutions based off the current need. Choosing the right cloud service and deployment model is critical for medical device manufacturers and HTM professionals looking to leverage the benefits of cloud computing. Several popular models include Service models (Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS)) and Deployment models (Public, private, multi-cloud and hybrid). All options have their benefits and will provide different services, depending on the need. However, the goal when selecting a cloud solution should be that it is able to improve patient care without compromising safety and privacy.
Vulnerabilities are inevitable and may increase if the cloud solution is not scrutinized and configured correctly. One of the primary vulnerabilities associated with cloud systems is the risk of data breaches. Patient data is stored externally to a hospital environment, which opens the potential for hackers to gain unauthorized access to the cloud system and steal sensitive patient information. This can include Personal Identifiable Information (PII)/Protected Health Information (PHI) such as Social Security numbers, medication histories or diagnoses. In addition to data breach, since cloud-based solutions are accessed by the Internet and the servers are managed externally, privacy and regulatory compliance are always going to be a concern. Evaluating how patient data is tracked and verifying that the system is compliant with regulations are key to protecting the patient data. The ability to secure a medical system may help make the decision of whether to use cloud-based medical devices or physical medical devices.
As HTM professionals, it is our job to ensure that any solutions selected have a strong and effective security plan. Some mitigation strategies should include enforcing powerful security controls, conducting risk assessments on the solutions and utilization of monitoring solutions. Enabling powerful security protocols (i.e firewalls, access control lists, encryption methods, multi-factor authentication, etc.) are necessary when managing and protecting the access of the patient data. Although systems may be limited in features if stronger security measures are taken, it is important to reduce the potential for data breaches. Another area that should be focused on when selecting the correct cloud solution is a detailed analysis of the risks and potential vulnerabilities of the product. A strong risk mitigation plan is important for reviewing the level of risk, which will help develop proper risk mitigation strategies. Lastly, requiring a monitoring solution for the product is imperative for tracking suspicious activities, recognizing and reporting potential security threats. Cyber-attacks are more prevalent and cloud solutions can be more vulnerable depending on the chosen solution. Therefore, a monitoring software can allow HTM professionals to identify issues early and take action to mitigate the damage.
Cloud solutions for medical devices offer many benefits to health care providers, but they also present a number of vulnerabilities that must be addressed. By understanding these risks and taking proactive steps to mitigate them, HTM professionals can ensure the safety and privacy of the system and, more importantly, the patient data.
Nadia ElKaissi, CHTM, is a biomedical engineer with Healthcare Technology Management VA Central Office (19HTM).

