"This book is a comprehensive companion for anyone in healthcare. The insights you gain here will enhance your understanding and help drive the mission to create a safer, more secure healthcare environment for everyone."
―TOM BRAYS, Cybersecurity Analyst and Technical Editor
"This book is a masterful guide for navigating the challenges of securing healthcare environments, from physical spaces to digital systems. It empowers leaders to protect what matters most. A must-read for anyone committed to advancing the safety and integrity of our healthcare institutions."
―ROBERT BLAKE, President, E1
"I’ve worked in healthcare for over 30 years and this book is necessary reading."
―JEAN DWYER, RN and Clinical Educator in Labor & Delivery
"This book is vital for anyone navigating the intersection of healthcare and cybersecurity. With real-world insight and practical strategies, I can confidently say it belongs on every security leader’s shelf."
―T. MILLS, Chief Information Security Officer and Author
"I highly recommend this book as it illustrates the importance of cybersecurity in healthcare, ethical concerns, and how devastating life can be without it."
―DEB MARTIN, Privacy and Security Advisor
"This book unpacks the complexities of technologies in healthcare with a playbook of security strategies."
―RENEE VOGLEY, Director, Business Operations at Cardinal Health
"This book tackles Bluetooth and wireless communication vulnerabilities within connected medical device infrastructures. Moreover, it offers practical mitigation strategies such as encryption, secure device pairing, continuous network monitoring, and multi-factor authentication―solutions that align with modern cybersecurity best practices. Its clear structure makes it accessible to both technical professionals and non-technical audiences."
―PAM KENNEDY, Security Compliance Auditor and Technical Editor
"Whether you’re fortifying infrastructure or ensuring compliance in 2025’s stricter regulatory requirements, this book is an indispensable tool."
―KEVIN KNAPP, Sr. Cybersecurity Engineer
"John has done a phenomenal job creating a comprehensive treatise on IoMT threat management. This is a must-read for anyone dealing with the deployment and operational use of technology in healthcare. He adeptly covers the technical security challenges but does not stop there. Healthcare administrators, clinical staff, support, and even patients will find this book invaluable. Join John on the journey as he digs into the overall threat landscape, enumerating indicators of threat and attack while offering crucial guidance on best practices, security testing, policy, and response."
―STEVE NARDONE, Division Chief and head of the Trusted Product Evaluation Program at the NSA, Sr. Dir. Security and Compliance, Ret.
A tactical and technical guide to securing network-connected medical devices
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, by John Chirillo, is an authoritative and up-to-date discussion of how to secure network-connected medical devices. Chirillo explains the relevant attack vectors, detection and prevention strategies, likely future trends, emerging threats, and the legal, regulatory, and ethical considerations that most frequently arise for professionals in this area.
Beginning with an accessible introduction to the field of Internet of Medical Things devices and their recent evolution, the book moves on to a detailed and technical discussion of how to prevent the most common―and lesser known―attacks against these devices. The author offers real-world scenarios, examples, and case studies that describe the tools, techniques, and strategies you can employ immediately to improve your organization’s security and mitigate risk.
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is perfect for cybersecurity professionals, healthcare-involved IT leadership and specialists, and medical researchers interested in protecting sensitive personal data and vital medical infrastructure.
About the Author
JOHN CHIRILLO is an accomplished, published programmer and author with decades of hands-on experience. He’s a leading expert on medical device security who speaks regularly on regulatory compliance, risk assessment and mitigation, and incident management.