November 8 is celebrated as World Radiology Day, a symbolic date because it was on November 8, 1895, that Wihelm Conrad Rontgen discovered the existence of X-rays, which earned him the Nobel Prize in Physics in 1901. Nowadays, radiology equipment is particularly advanced, as evidenced by the latest innovations.
Using technology developed by the European Organization for Nuclear Research (CERN), a New Zealand company succeeded in scanning a human being’s body and producing a 3D and color image. Such progress could have a major impact on the entire medical field. In combination with new technologies, current radiology devices would allow for more efficient diagnosis and patient follow-up. In parallel, in France, the University Hospital of Caen is testing a revolutionary imaging system on volunteer patients. Thanks to rotary encoders, this scanner can be used to produce 3D and very high definition images.
As medical devices become more and more sophisticated, security is a key point. The attacks that followed WannaCry in May 2017 highlighted the vulnerability of hospital systems to cybercrime. But what was not reported was that a number of key medical devices were also vulnerable. A recent research study has shown that MRI machines and radiology devices have been considered extremely vulnerable. In an undisclosed healthcare organization in the United States, security experts discovered security breaches in 68,000 of its medical systems, infecting nearly 97 MRI scanners. These security vulnerabilities could potentially allow hackers to remotely access device administration as well as medical data stored on hospital IT servers….
The complex issue of protecting medical devices and storing health data must oblige all actors to strengthen the security of infrastructures and information exchanges, through the proliferation of new connected technologies. In order to limit the risks of cyber attacks, several measures can be taken, such as strengthening the security of connected medical devices, the use of technologies capable of identifying malware, the use of encryption mechanisms and cybersecurity awareness training.