How to Use Edge Computing to Combat CyberattacksHow to Use Edge Computing to Combat Cyberattacks
Organizations can lower the risk of damaging cyberattacks through the deployment of edge computing systems.
October 3, 2022
Sponsored by Schneider Electric
By Schneider Electric Guest Blogger
The rapid proliferation of the internet of things (IOT) across the health care industry has brought along with it both unprecedented data access and analysis benefits, as well as new categories of operational risk. On the one hand, health care professionals can leverage innovations such as “big data” and edge computing to make faster and more accurate decisions. On the other hand, as more connected IoT devices spread across the healthcare facility, the potential cyberattack surface for hackers − who are instigating operational disruptions and demanding ransomware payments − expands.
According to the Ponemon Institute, 75% of global health care organizations have experienced cyberattacks. The HiPAA Journal Online has also reported that, in 2020, health care facilities in the United States experienced a 25% increase in cyber breaches over the previous year. As a result, many health care facility operators recognize the need to redouble their efforts to protect patients, staff, medical equipment assets, IT equipment and operational infrastructure such as power, cooling and ventilation systems from cyberattacks.
Edge Computing as a Strategy to Combat Cyberattacks
One of the innovative ways that hospital staffs can lower the risk of damaging cyberattacks is through the deployment of edge computing systems. Edge computing can take many forms, but, in general, it usually consists of on-premises computing via distributed servers, sensors and/or micro data centers, as well as other devices that can function independently or in conjunction with the cloud.
In traditional settings, hospitals collect data in a large, centralized, on-premises data center, and the operators hope the data remains self-contained and not exposed to potential hackers. However, data is generated and collected on the periphery of the data center — for example, in nursing stations, radiology departments and operating rooms — and protecting that data on its way to the centralized data center can be problematic. Also, most current hospital systems don’t utilize modeling or AI to try and predict where cybersecurity gaps exist. One of the unique advantages of edge computing is the ability to analyze data close to the source of data generation so that cybersecurity threats can be quickly detected and mitigated.
The benefits of edge computing also include bandwidth savings, real-time processing of local data, reduced operational expenses, reduced network latency and enhanced patient safety. Health care IT departments are finding that edge computing benefits far outweigh the potential drawbacks (such as more systems to manage and cybersecurity protection).
IT departments short on staff may struggle to keep up with edge computing maintenance activities such as infrastructure monitoring. That’s why most gravitate toward the deployment of remotely managed security and environmental monitoring solutions for their edge deployments.
Edge systems are distributed — separate departments such as power management, HVAC, planning systems, medical equipment, resources and building automation each can have their own edge system – so it becomes much easier, from a cybersecurity perspective, to segment the various networks. This network layer is important to protect because it’s where devices communicate and turn data into information that facilitates accurate and fast decisions.
The practice of network segmentation, in the context of cybersecurity, implies building protective virtual fences by splitting the hospital networks into zones so that, if a breach occurs, the damage is limited to the subnetwork as opposed to the entire network. In a network segmentation scenario, if a hacker were to successfully attack an aging Windows server that is operating the building management system, for example, the upstream analytics and downstream individual devices would still be protected.
New-Generation Products and Edge System Management Tools Also Bolster Cybersecurity
One of the best ways to manage edge computing systems is through the deployment of remote monitoring software. For example, software packages like Schneider Electric’s EcoStruxure IT automatically and regularly collect critical infrastructure sensor values and submit that data to a centralized data lake in the cloud. That data is then pooled with data collected from thousands of other Schneider Electric customer sites.
Once in the data lake, asset behavior across many equipment brands and multiple sites is compared. All actions taken in response to alarms are tracked using data on equipment behavior before and after an incident. This output provides a clear record of actions and their consequences, positive and negative. Such data pool correlation offers a deeper understanding of the root causes of problems. It can generate predictive reports that advise operators regarding which actions to take before problems result in unanticipated downtime.
Skilled IT staff are in short supply, especially in smaller, more rural hospitals, so many health care facility operators are turning to managed service providers (MSPs) who are trained and who possess the level of expertise needed to remotely monitor edge computing IT, power and cooling. Using the monitoring technology, they can reduce the need to travel on-site for troubleshooting, thereby saving overall maintenance costs. They can also implement predictive maintenance practices by capturing warning signs of anomalies (like internal temperatures that are exceeding pre-set thresholds or behavioral anomalies) and addressing issues before they result in unanticipated downtime.
In addition, when identifying edge software and hardware products, seek out solutions that are developed and manufactured with a Secure Development Lifecycle (SDL) approach. Product managers and engineers perform secure architecture reviews, test potential threats through modeling of the conceptual security design, follow secure coding rules, use specialized tools to analyze code and perform security testing of each product. These actions help to “harden” products, making them more resilient against cyberattacks. In this way, as new products replace old, entire systems evolve to become more cybersecure.
More Information on Lower Cybersecurity Risks
To learn more about how remote monitoring and management solutions help health care IT teams to better support edge systems and help combat cybersecurity threats, visit the EcoStruxure IT web page.
This guest blog is part of a Channel Futures sponsorship.
Read more about:MSPs
You May Also Like
AWS re:Invent Partner, Vendor News: Cisco, Salesforce, MoreDec 01, 2023
People on the Move: Comcast, Cisco, NICE, TPx, Barracuda, MoreNov 29, 2023
AWS re:Invent 2023 Partner News: Marketplace, Salesforce, Certs, MoreNov 29, 2023
AWS re:Invent Expo: VMware, Snyk, HPE, More Showcase Cloud, Security, AINov 28, 2023