October 7, 2025
Couldn’t join us live? We unpacked how regulators and standards bodies define “legacy” devices, how this may differ from healthcare providers’ view, what the FDA’s latest guidance means for end-of-life (EOL) and end-of-support (EOS) planning, how risk responsibility shifts from manufacturers to operators (such as healthcare providers), and the practical steps healthcare organizations can take today to reduce future legacy burden. Along the way, we drew lessons from high-profile incidents like WannaCry and explored the future of post-quantum cryptography.
Here’s what you missed.
The FDA is raising the bar on cybersecurity expectations. Under the FD&C Act, Section 524B, manufacturers must now provide a reasonable assurance that devices and related systems remain cybersecure - which includes documenting support windows and end-of-support dates for all software components.
This makes EOL/EOS planning not just a best practice, but a regulatory obligation. For device makers, it means proactively communicating how long software and third-party components will be supported. For providers, it means adjusting procurement and replacement planning to account for security risks across the full lifecycle.
The term “legacy” is often thrown around loosely, but different stakeholders define it in very different ways:
The nuance matters. Misapplying these definitions can lead to either overestimating security posture or under-investing in protection strategies.
When vendor support ends at EOS, risk doesn’t disappear - it shifts. But responsibility only truly transfers when three things are in place:
This distinction between end-of-support and end-of-use is critical. Devices often stay in service well past official support timelines, and without a structured risk transfer process, HDOs inherit risk by default - often unknowingly.
The 2017 WannaCry ransomware outbreak drove this point home. In the UK, 81 of 236 NHS hospitals were affected, with 20,000+ cancellations of appointments and procedures.
Why? Legacy systems running unpatched, popular software stacks created an outsized attack surface. As the webinar highlighted, attackers are economically rational: when vulnerabilities scale across many organizations, compromise is only a matter of time, even if, as in the NHS case, an organization is not specifically targeted.
Another overlooked risk? Improper device retirement. Too often, equipment leaves service with PHI, clinical trial data, or even user or Wi-Fi credentials still stored locally. These artifacts can surface later in secondary markets, exposing sensitive data long after the device’s “official” life is over.
Effective decommissioning should include data purging, credential resets, verification that no sensitive information can be recovered, and documentation of these activities.
Securing legacy devices isn’t just about end-of-support and end-of-use planning. Organizations should:
Healthcare Delivery Organizations (HDOs):
Medical Device Manufacturers (MDMs):
This recap only scratches the surface. To hear the full discussion - including practical strategies, regulatory insights, and expert Q&A - watch the on-demand webinar:
Watch the recording here: https://youtu.be/IvW248JuFko
October 6, 2025
September 30, 2025
September 15, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information