skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


Computing embedded within medical equipment proved to be particularly vulnerable during the WannaCry cyberattack of May 2017. Both medical equipment suppliers and healthcare providers need to contribute to solving this problem.


  • Healthcare providers should make their own plans to protect legacy and new medical equipment, involving security specialists and considering what to do in the event of a breach.

Features and Benefits

  • Identifies key risk factors for embedded technology within critical medical equipment.
  • Assesses key risk factors for contemporary hospitals.

Key questions answered

  • What are the key lessons learned for embedded technology typically found in some hospital equipment?
  • How can healthcare managers work with suppliers to guard against cyberattacks?

Table of contents


  • Catalyst
  • Ovum view
  • Key messages


  • Recommendations for healthcare enterprises
  • Recommendations for vendors

Vulnerabilities of connected medical equipment

  • General vulnerabilities of connected devices
  • Particular vulnerabilities of medical equipment
  • Healthcare providers' specific risks
  • WannaCry's impact on English NHS medical equipment
  • Impact on medical equipment in the US

Perspectives of equipment makers, Microsoft, and security specialists

  • Equipment makers
  • Microsoft
  • Security suppliers


  • Methodology
  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now