Global Information Security Certification Institution EC-Council issued stern warnings about a lack of wireless security implemented by medical device manufacturers, after the American House Energy and Commerce Committee expressed concern about regulating the wireless security of medical devices.
Albuquerque, NM (PRWEB) September 22, 2011
Manufacturers of medical devices need to tread carefully when implementing wireless technologies such as Bluetooth in their equipment, says EC-Council, a leading global information security expert. In high-risk industries such as healthcare, the smallest innocuous mistake may often turn fatal.
At the recent 2011 Black Hat hacker conference in Las Vegas, security researcher and Type 1 diabetic Jerome Radcliffe demonstrated the vulnerabilities of his own wireless insulin pump and glucose meter by disrupting its operations through electronic interference. Although there was no real harm done, it was a clear example of how susceptible life-sustaining devices were to external influence.
This shocking demonstration showed a lack of awareness of such medical wireless security risks among legislators in the country, raising alarm among the members of the House Energy and Commerce Committee. Soon after, Democratic Representatives Anna Eshoo and Ed Markey sent letters of concern to the Government Accountability Office, asking for a review of the safety screening policies of the Federal Communications Commission.
Jay Bavisi, the president of EC-Council, says; “The time for the industry to take wireless security seriously is long overdue”. He pointed out that although the medical industry had made great progress in new advancements such as adopting wireless technology, the security aspect of such emerging technologies was not sufficiently catching up. Read more…
Cloud computing looks set to become the next big thing, but security concerns mar its adoption as the United States gets ready to pump US$53 billion into fourth-generation networks over the next five years. EC-Council offers cutting-edge solutions such as cryptography courses and cryptanalysis training for individuals with security concerns over emerging key technologies.
New York City, NY (PRWEB) September 22, 2011
Amazon, Microsoft, and Sonyare examples of just some companies that have recently made headlines for all the wrong reasons, having had their cloud computing efforts breached by unethical hackers. EC-Council, an international information security certification body, reports that without proper infrastructure and cryptanalysis training, usage of cloud computing may never be a fully secure platform for individuals or businesses.
Jay Bavisi, the President of EC-Council, says that even though general cloud architecture is relatively secure, it is easy for irreparable damage to be done to online stored data once the first layer of security is breached by an intruder.
Cloud-based services require an operation and management method similar to enterprise systems, demanding well-encrypted data with secure physical locations. With cloud services, every piece of data is stored on a physical hard drive or in solid state memory. This data is thus accessible to anyone with an Internet connection, further highlighting the importance of secure protection. Read more…