Securing Medical and Wellness Data

Your health data is one of most important pieces of a data that is personal and confidential to you. Through the advent of sensor innovations we are finding many more devices gathering this data such as your fitness bands, smartwatch, even your phone counting your steps automatically without you having to do anything. This is only the beginning. We are starting to see innovations in medical and wellness monitoring from all sorts of devices, from toothbrushes that can detect cancer, to patches you wear that monitor UV exposure or hydration. Innovations in microfluidic technologies are enabling analysis of your blood, sweat, and urine at price points where it can reach consumers hands in both developed and developing countries. 

This data, if used correctly, will keep us more informed of what’s happening inside and outside our bodies, and give us alert with the right information at the right time to make informed decisions. Taking it one step further, mobile and cloud platforms can enable a holistic system of health to inform our trusted family/friend circle about changes in health to help individuals make the right lifestyle choices. It will also help caregivers know the right time to intervene, potentially staving off a more severe condition.

Unfortunately, as with any technological innovation, it can also have potential malicious uses resulting in substantial financial and social consequences:

  • Insurance providers could use the data to increase premiums or cancel policies
  • Informed employers may choose healthier candidates (to keep costs down)
  • Dating applications could add medical filters

But how is the data being handled from when it gets created at the source? Is it being guarded all the way from the sensor to the phone, to the cloud? What happens to your data in the cloud? Is it shared with third parties? Have you read to read the Terms and Conditions for each of your digital devices to understand the answers to these questions? In this blog, we will aim to address some of the basic vulnerabilities of data as it travels from sensor->phone->cloud and explore a method to safeguard it as well as talk about some the initiatives taking place to help safeguard our health data.

Threats and hacks

There are two threat vectors that we will address in this video:

  1. Screen Scrape Attacks

  2. BLE attacks

Screen scrape attacks leverage the ability to “record” the frame buffer of the screen of a device to steal the data as an app renders to the screen. This technique has been used to steal everything from passwords to high value video content.

Today the majority of medical and wellness devices utilize Bluetooth LE to communicate between the sensor and use the phone as the “gateway” to go to the cloud. A large number of these devices tend to rely solely on Bluetooth link layer encryption. This presents a vulnerability in that data can be stolen at the “application layer” while it’s in motion on the phone or gateway itself. The video below demonstrates this threat.