Cybersecurity

Preparedness & Mitigation

An Essential Priority within the Mindray Distributed Monitoring Network

The digitization of healthcare in the U.S. continues to accelerate with no sign of decline. From Electronic Medical Records (EMRs) to millions of connected medical devices, the flow of patient information is increasing exponentially. With such an increase in the volume and modes of data transmission comes a greater vulnerability to cybercrime. As a result, cybersecurity is an ever-growing concern within the healthcare sector. Mindray is committed to protecting patient data and assuring privacy. In doing so, there are three key areas on which we focus – Endpoint Security, Patient Privacy and Security by Design.

Endpoint Security

Endpoint security focuses on minimizing the threat of unauthorized access through devices such as laptops, workstations, mobile and bedside medical devices.
Mindray starts by:

  • Reducing the network attack surface by segmenting the network
  • Eliminating unnecessary pathways
  • Restricting access to communications on the network
  • Locking down and securing these devices is the definitive and core component of Mindray Endpoint Security
  • In addition to requiring secure firewalls and antivirus protection for network deployment, Mindray applies Whitelisting and Operating System (OS) Hardening for further safeguarding

Patient Privacy

Mindray’s approach to protecting PII incorporates secure encryption, password management and secure
data deletion.

  • The BeneVision Distributed Monitoring System (DMS) utilizes features such as user access controls and customized screen configurations to support patient confidentiality.
  • Data displayed upon the screen or in reports is configurable to limit patient information shown
  • Logs obtained for troubleshooting purposes are extracted without PII or encrypted to protect patient information.
  • Mindray integrates with the hospital’s Active Directory to centrally manage user accounts, rights and permissions complying to secure password policies.

When deployed simultaneously, these various strategies prove effective in supporting patient privacy.

Security by Design

This type of security is focused on elements that are inherent in the device or system with the explicit purpose of maintaining security. It all starts during product development where security risk management, security design practices, and security code analysis are performed.

  • Rigorous testing such as Fuzz testing repeatedly bombards a computer application with erroneous random data to look for system crashes and/or memory leaks. Data obtained from this type of testing can identify any system instability in very challenging circumstances so that these instabilities can be addressed in the design phase, prior to product release.
  • Similar to Fuzz testing, Penetration testing is another automated technique that simulates a cybersecurity attack to identify both vulnerabilities and strengths within a software application or system.
  • Security by design continues well beyond product release; Mindray continuously evaluates patches and security updates to ensure product security over time.

Defense in Depth

The sum of Mindray’s multifaceted cybersecurity strategies can best be described as Defense-in-Depth. All of the strategies described here are methods which complement existing institutional efforts to reduce the incidence of cybercrime.

Exceptional Service & Support

Purchase from Mindray includes comprehensive clinical training by Mindray’s specialists. Additionally, technical remote support is available 24 hours a day, 7 days a week, at no charge.

Our dedicated field service team and in-house technical support organization represent one of the largest direct service teams in the industry. Individually and collectively they are committed to enhancing patient care while protecting your investment.