
By Nadia ElKaissi, CHTM
Imagine this: A hospital’s ICU is operating at full capacity. A patient relies on a ventilator that is connected to the hospital’s network for real-time monitoring and remote configuration. Without warning, the ventilator stops functioning. Doctors and nurses rush to troubleshoot, but their efforts are halted when they discover the device’s configuration has been tampered with by an unauthorized user who accessed it remotely. The devices had no multi-factor authentication (MFA) mechanism, meaning access was granted with only a username and password.
This isn’t a hypothetical situation. It reflects the growing vulnerabilities of medical devices in a world where cyberattacks increasingly target healthcare. The consequences of such breaches are dire, compromised patient safety, operational disruptions, and significant financial penalties under data privacy regulations.
So, what is MFA and why does it matter for medical devices? MFA is a security measure requiring users to provide two or more verification factors to access a system. These factors typically include:
1. Something you know (passwords, pins)
2. Something you have (security tokens, smart card)
3. Something you are (biometric data like fingerprints or facial recognition)
MFA strengthens security by ensuring that even if one credential is stolen or guessed, unauthorized access remains difficult. For medical devices, which often handle sensitive patient data and directly impact clinical care, MFA can serve as a crucial part to prevent unauthorized access.
Although MFA is a powerful tool, its implementation on medical devices is not always feasible because of a few challenges:
1. LEGACY SYSTEMS
Many medical devices still in use today are built on outdated hardware and software. These systems were designed before cybersecurity threats were a major consideration, making it difficult to retrofit them with modern security features like MFA. Although, it is always the recommendation to replace anything with an unsupported operating system. Realistically, there might not be an available system that can replace the legacy just yet. This is where evaluating and monitoring the risk of the systems becomes necessary.
2. PROPRIETY SYSTEM/SOFTWARE
Medical devices often operate within a complex ecosystem, relying on proprietary software and limited user interfaces. Theses constraints make it challenging to integrate MFA without compromising usability or requiring significant re-engineering.
3. REGULATORY AND CERTIFICATION HURDLES
Adding MFA to a medical device may require re-certification under regulatory bodies such as FDA. This can be time-consuming and costly, especially for manufacturers of legacy devices.
While MFA is an important layer of defense, it is not the only layer to consider. Effective cybersecurity of medical devices requires a multi-faceted approach to include:
1. Device Hardening
Systems should have a process to ensure devices run the latest firmware and are patched against unknown vulnerabilities. All unnecessary services should be disabled as well as default accounts.
2. Network Segmentation
Medical devices should operate on isolated network segments, limiting access to only essential systems.
3. Access Logging and Monitoring
Continuous monitoring of access logs helps detect unauthorized attempts and potential breaches.
4. Training and Awareness
Healthcare staff should be trained to recognize phishing attempts and other cyber threats that could bypass MFA through social engineering.
Now, let us revisit the ICU scenario again. Had MFA been implemented on the ventilator; the attacker would not have been unable to gain access with only stolen login credentials. However, as some understand, not many ventilators have the capability to implement MFA. For systems similar in configuration, there are other ways to prevent the attack if other weaknesses existed, such as a hardcoded backdoor account left by the manufacturer. In this scenario, a comprehensive approach combining MFA with network segmentation, regular updates, and robust monitoring would have created a far more secure environment.
As the healthcare industry continues to embrace connected medical devices, cybersecurity must be prioritized alongside clinical innovation. Policymakers, manufacturers and healthcare organizations need to work together to:
- Mandate security standards for new devices, including MFA readiness.
- Phase out legacy systems that cannot meet modern cybersecurity requirements.
- Invest in a cybersecurity infrastructure, including network security, training and threat detection systems.
MFA is a critical component in securing medical devices, but it cannot stand alone. Only a layered defense approach can ensure that healthcare systems remain resilient in the face of ever-evolving cyber threats.

