{"id":5599,"date":"2021-08-06T13:03:55","date_gmt":"2021-08-06T12:03:55","guid":{"rendered":"https:\/\/medtech-ingenieur.de\/?p=5599"},"modified":"2023-09-08T15:11:56","modified_gmt":"2023-09-08T13:11:56","slug":"postmarket-cybersecurity-wenn-das-produkt-im-markt-ist","status":"publish","type":"post","link":"https:\/\/medtech-ingenieur.de\/en\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/","title":{"rendered":"Postmarket Cybersecurity \u2013 When the product is on the market"},"content":{"rendered":"<p>A product has been successfully approved and is on the market. Can cybersecurity activities now be discontinued? Of course, that&#039;s not possible. Cybersecurity risks arise continuously, and it&#039;s not possible to identify and address all vulnerabilities in advance. Therefore, cybersecurity must be viewed as a process that must be continuously maintained, hand in hand with risk management. Failure to maintain cybersecurity leads to the following threats:<\/p>\n<ul>\n<li>Impairment of device functionality<\/li>\n<li>Loss of availability<\/li>\n<li>Loss of integrity of (medical or personal) data<\/li>\n<li>Compromise other connected devices or networks due to security threats<\/li>\n<\/ul>\n<p>And this, in turn, can lead to injuries and even death in medical devices.<\/p>\n<h3>What should one do specifically?<\/h3>\n<p>The attached list is intended to provide guidance on which activities should be performed regularly. These activities should be planned accordingly within one or more processes.<\/p>\n<ul>\n<li>Regularly check cybersecurity vulnerability and risk databases for new vulnerabilities.<\/li>\n<li>Check the SOUP and OTS software error lists regularly.<\/li>\n<li>Ensure good cybersecurity hygiene and further minimize acceptable risks.<\/li>\n<li>Provide software patches and updates to quickly close vulnerabilities.<\/li>\n<li>Thoroughly verify and validate all software changes, patches, and updates.<\/li>\n<li>Review market feedback on cybersecurity attacks and events. This also applies to products from other manufacturers.<\/li>\n<li>Conduct penetration tests regularly or have them carried out by external companies.<\/li>\n<li>Regularly update accompanying information such as the instructions for use and inform the customer of vulnerabilities and provide guidance so that the customer can take appropriate steps to mitigate risks and make informed decisions regarding device use.<\/li>\n<li>Check devices on the market for cybersecurity incidents (e.g., logging access attempts with false credentials or evaluating DoS attacks).<\/li>\n<li>When vulnerabilities are identified, promptly inform customers and take action to address risks while the vulnerability exists.<\/li>\n<li>Regularly review cybersecurity risk management. See also the article\u00a0<a title=\"AAMI TIR57 \u2013 Cybersecurity Risk Management for Medical Devices\" href=\"https:\/\/medtech-ingenieur.de\/en\/aami-tir57\/\" target=\"_blank\" rel=\"noopener\">AAMI TIR57 \u2013 Cybersecurity Risk Management for Medical Devices<\/a>.<\/li>\n<\/ul>\n<h3>What should be reported to the FDA?<\/h3>\n<p>Device manufacturers are required by 21 CFR part 806 to notify the FDA of changes and corrections. However, the FDA points out that changes that are solely intended to improve cybersecurity are not reportable. <strong>if<\/strong> the following circumstances are met:<\/p>\n<ol>\n<li>There are no known serious adverse events or deaths related to the vulnerability;<\/li>\n<li>The manufacturer will communicate as soon as possible, but no later than <strong>30 days<\/strong> After the vulnerability becomes known, the manufacturer communicates with its customers and users about the vulnerability, identifies interim mitigating measures, and develops a remediation plan to reduce the residual risk to an acceptable level. The controls should not pose a greater risk to the security and essential performance of the device than the original vulnerability. The manufacturer must document the time-based justification for its remediation plan. Communication with the customer should include, at a minimum, the following:<br \/>\na. Description of the vulnerability, including an impact assessment based on the manufacturer\u2019s current knowledge,<br \/>\nb. Declaration by the manufacturer to make efforts to eliminate the risk of patient harm as soon as possible,<br \/>\nc. Description of compensating measures, if any, and<br \/>\nd. Indication that the manufacturer is working on it and will inform about the availability of a solution in the future.<\/li>\n<li>As soon as possible, but no later than <strong>60 days<\/strong> After the vulnerability is identified, the manufacturer fixes the vulnerability, validates the change, and distributes the ready-to-use fix to its customers and the user community, reducing the residual risk to an acceptable level. Under certain circumstances, a compensating measure could provide a long-term solution, provided the risk of patient harm is reduced to an acceptable level. The measures should not pose a greater risk to the safety and essential performance of the product than the original vulnerability. Furthermore, the manufacturer should follow up with end users beyond the initial 60-day period if necessary.<\/li>\n<li>The manufacturer actively participates as a member of an ISAO (Information Sharing and Analysis Organization) that shares vulnerabilities and threats affecting medical devices, such as NH-ISAC, and makes all communications available to the ISAO after notifying its customers;<\/li>\n<\/ol>\n<p>All manufacturers should be aware of the relatively short response times. Often, the development team is working on other products, and it&#039;s quite a challenge to find a solution and complete all activities in such a short time. Many manufacturers are also not members of an ISAO, which ultimately makes notification to the FDA necessary.<\/p>\n<h3>Cybersecurity Examples<\/h3>\n<p>Examples are the best way to understand these often abstract issues. I&#039;ve included two here to help you better understand what a concrete cybersecurity attack might be and how to proceed. Of course, it&#039;s also worth taking a look at the FDA guidance itself.<\/p>\n<h5>1) Malware on a gas blood analyzer<\/h5>\n<p>A device manufacturer receives customer feedback that a gas blood analyzer has been infected with malware and there is concern that the malware could alter the data on the device. The manufacturer examines the device and confirms the presence of malware. However, the data was not tampered with, and the security and essential performance characteristics of the device were not affected by the malware. Risk management therefore determines that the risk is acceptable. The device manufacturer informs users how to remove the malware and subsequently provides a patch to address the vulnerability. The customer provides all relevant data to ISAO. No notification to the FDA under 21 CFR part 806 is required.<\/p>\n<h5>2) Defibrillator<\/h5>\n<p>A manufacturer is alerted by a researcher to a vulnerability that could allow its Class III defibrillator to be reprogrammed by an unauthorized user. If exploited, this vulnerability could result in permanent disability, life-threatening injury, or death. The manufacturer is unaware that the vulnerability has been exploited and determines that the vulnerability is related to a hard-coded password. The risk assessment concludes that the exploitability of the vulnerability is moderate and the risk of patient harm is uncontrolled. The manufacturer notifies appropriate stakeholders and distributes a validated emergency patch within 60 days. The manufacturer is not actively participating as a member of an ISAO and is therefore reporting this action to the FDA in accordance with 21 CFR 806.10.<\/p>\n<p>Further examples can be found in the <a href=\"https:\/\/www.fda.gov\/regulatory-information\/search-fda-guidance-documents\/postmarket-management-cybersecurity-medical-devices\" target=\"_blank\" rel=\"nofollow noopener\">FDA&#039;s Postmarket Management of Cybersecurity in Medical Devices Guidance.<\/a><\/p>\n<h3>Conclusion<\/h3>\n<p>It&#039;s extremely sensible to review your own market surveillance processes to ensure they&#039;re suitable for the specifics of cybersecurity. Especially in cybersecurity, vulnerabilities can become known at short notice, requiring rapid remediation. Furthermore, there are certain specifics regarding reporting deadlines and measures to be observed. Should an incident occur, there&#039;s already enough to do. Then you shouldn&#039;t have to start laboriously familiarizing yourself with the subject of cybersecurity.<\/p>\n<p>If you have any questions about cybersecurity in the field of medical technology, I look forward to hearing from you.<\/p>\n<p>Best regards<\/p>\n<p>Goran Madzar<\/p>","protected":false},"excerpt":{"rendered":"<p>Ein Produkt wurde erfolgreich zugelassen und befindet sich im Markt. Kann man jetzt die Cybersecurity Aktivit\u00e4ten einstellen? Das geht nat\u00fcrlich nicht. Cybersecurity Risiken treten kontinuierlich auf und es ist nicht m\u00f6glich alle Schwachstellen bereits im Vorfeld zu identifizieren und abzustellen. Daher muss Cybersecurity als Prozess betrachtet werden, der Hand in Hand mit dem Risikomanagement kontinuierlich [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5707,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,502,6],"tags":[464,310,558,559],"class_list":["post-5599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-normen","category-security","category-software","tag-cybersecurity","tag-fda","tag-postmarket","tag-vulnerability","post-wrapper","thrv_wrapper"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Postmarket Cybersecurity - Wenn das Produkt im Markt ist - MEDtech Ingenieur GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/medtech-ingenieur.de\/en\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Postmarket Cybersecurity - Wenn das Produkt im Markt ist - MEDtech Ingenieur GmbH\" \/>\n<meta property=\"og:description\" content=\"Ein Produkt wurde erfolgreich zugelassen und befindet sich im Markt. Kann man jetzt die Cybersecurity Aktivit\u00e4ten einstellen? Das geht nat\u00fcrlich nicht. Cybersecurity Risiken treten kontinuierlich auf und es ist nicht m\u00f6glich alle Schwachstellen bereits im Vorfeld zu identifizieren und abzustellen. Daher muss Cybersecurity als Prozess betrachtet werden, der Hand in Hand mit dem Risikomanagement kontinuierlich [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/medtech-ingenieur.de\/en\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/\" \/>\n<meta property=\"og:site_name\" content=\"MEDtech Ingenieur GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/medtechIngenieur\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/medtechIngenieur\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T12:03:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T13:11:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Goran Madzar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/MedtechIng\" \/>\n<meta name=\"twitter:site\" content=\"@MedtechIng\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Goran Madzar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/\"},\"author\":{\"name\":\"Goran Madzar\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#\\\/schema\\\/person\\\/8bdea6549218b62b5ec7c4c145a5c74a\"},\"headline\":\"Postmarket Cybersecurity &#8211; Wenn das Produkt im Markt ist\",\"datePublished\":\"2021-08-06T12:03:55+00:00\",\"dateModified\":\"2023-09-08T13:11:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/\"},\"wordCount\":1208,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/security-4907127_640.jpg\",\"keywords\":[\"Cybersecurity\",\"FDA\",\"Postmarket\",\"Vulnerability\"],\"articleSection\":[\"Normen\",\"Security\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/\",\"name\":\"Postmarket Cybersecurity - Wenn das Produkt im Markt ist - MEDtech Ingenieur GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/security-4907127_640.jpg\",\"datePublished\":\"2021-08-06T12:03:55+00:00\",\"dateModified\":\"2023-09-08T13:11:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/security-4907127_640.jpg\",\"contentUrl\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/security-4907127_640.jpg\",\"width\":640,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/medtech-ingenieur.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Postmarket Cybersecurity &#8211; Wenn das Produkt im Markt ist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#website\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/\",\"name\":\"MEDtech Ingenieur GmbH\",\"description\":\"Ingenieursdienstleister f\u00fcr Medizintechnik\",\"publisher\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#organization\"},\"alternateName\":\"MEDtech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/medtech-ingenieur.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#organization\",\"name\":\"MEDtech Ingenieur\",\"alternateName\":\"MEDtech\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/logo-700x700-1.png\",\"contentUrl\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/logo-700x700-1.png\",\"width\":700,\"height\":700,\"caption\":\"MEDtech Ingenieur\"},\"image\":{\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/medtechIngenieur\",\"https:\\\/\\\/x.com\\\/MedtechIng\",\"https:\\\/\\\/www.instagram.com\\\/medtech.ingenieure\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/37871229\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/#\\\/schema\\\/person\\\/8bdea6549218b62b5ec7c4c145a5c74a\",\"name\":\"Goran Madzar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-Med_Mit-032-scaled-1-96x96.jpg\",\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-Med_Mit-032-scaled-1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/medtech-ingenieur.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-Med_Mit-032-scaled-1-96x96.jpg\",\"caption\":\"Goran Madzar\"},\"description\":\"MEDtech Ingenieur aus Leidenschaft! Mein Team und ich helfen Medizintechnik-Herstellern mit Engineering-Dienstleistungen dabei, Produkte zu entwickeln und in Verkehr zu bringen! Sprechen sie mich gerne an, ob bei LinkedIn oder per Mail. Ich freue mich Sie kennenzulernen.\",\"sameAs\":[\"https:\\\/\\\/medtech-ingenieur.de\\\/author\\\/gmadzar\\\/\",\"https:\\\/\\\/www.facebook.com\\\/medtechIngenieur\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/MedtechIng\"],\"url\":\"https:\\\/\\\/medtech-ingenieur.de\\\/en\\\/author\\\/gmadzar\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Postmarket Cybersecurity - When the product is on the market - MEDtech Ingenieur GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/medtech-ingenieur.de\/en\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/","og_locale":"en_US","og_type":"article","og_title":"Postmarket Cybersecurity - Wenn das Produkt im Markt ist - MEDtech Ingenieur GmbH","og_description":"Ein Produkt wurde erfolgreich zugelassen und befindet sich im Markt. Kann man jetzt die Cybersecurity Aktivit\u00e4ten einstellen? Das geht nat\u00fcrlich nicht. Cybersecurity Risiken treten kontinuierlich auf und es ist nicht m\u00f6glich alle Schwachstellen bereits im Vorfeld zu identifizieren und abzustellen. Daher muss Cybersecurity als Prozess betrachtet werden, der Hand in Hand mit dem Risikomanagement kontinuierlich [&hellip;]","og_url":"https:\/\/medtech-ingenieur.de\/en\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/","og_site_name":"MEDtech Ingenieur GmbH","article_publisher":"https:\/\/www.facebook.com\/medtechIngenieur","article_author":"https:\/\/www.facebook.com\/medtechIngenieur\/","article_published_time":"2021-08-06T12:03:55+00:00","article_modified_time":"2023-09-08T13:11:56+00:00","og_image":[{"width":640,"height":400,"url":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg","type":"image\/jpeg"}],"author":"Goran Madzar","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/MedtechIng","twitter_site":"@MedtechIng","twitter_misc":{"Written by":"Goran Madzar","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#article","isPartOf":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/"},"author":{"name":"Goran Madzar","@id":"https:\/\/medtech-ingenieur.de\/#\/schema\/person\/8bdea6549218b62b5ec7c4c145a5c74a"},"headline":"Postmarket Cybersecurity &#8211; Wenn das Produkt im Markt ist","datePublished":"2021-08-06T12:03:55+00:00","dateModified":"2023-09-08T13:11:56+00:00","mainEntityOfPage":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/"},"wordCount":1208,"commentCount":0,"publisher":{"@id":"https:\/\/medtech-ingenieur.de\/#organization"},"image":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#primaryimage"},"thumbnailUrl":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg","keywords":["Cybersecurity","FDA","Postmarket","Vulnerability"],"articleSection":["Normen","Security","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/","url":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/","name":"Postmarket Cybersecurity - When the product is on the market - MEDtech Ingenieur GmbH","isPartOf":{"@id":"https:\/\/medtech-ingenieur.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#primaryimage"},"image":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#primaryimage"},"thumbnailUrl":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg","datePublished":"2021-08-06T12:03:55+00:00","dateModified":"2023-09-08T13:11:56+00:00","breadcrumb":{"@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#primaryimage","url":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg","contentUrl":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2021\/07\/security-4907127_640.jpg","width":640,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/medtech-ingenieur.de\/postmarket-cybersecurity-wenn-das-produkt-im-markt-ist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/medtech-ingenieur.de\/"},{"@type":"ListItem","position":2,"name":"Postmarket Cybersecurity &#8211; Wenn das Produkt im Markt ist"}]},{"@type":"WebSite","@id":"https:\/\/medtech-ingenieur.de\/#website","url":"https:\/\/medtech-ingenieur.de\/","name":"MEDtech Ingenieur GmbH","description":"Engineering service provider for medical technology","publisher":{"@id":"https:\/\/medtech-ingenieur.de\/#organization"},"alternateName":"MEDtech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/medtech-ingenieur.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/medtech-ingenieur.de\/#organization","name":"MEDtech Engineer","alternateName":"MEDtech","url":"https:\/\/medtech-ingenieur.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medtech-ingenieur.de\/#\/schema\/logo\/image\/","url":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2024\/01\/logo-700x700-1.png","contentUrl":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2024\/01\/logo-700x700-1.png","width":700,"height":700,"caption":"MEDtech Ingenieur"},"image":{"@id":"https:\/\/medtech-ingenieur.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/medtechIngenieur","https:\/\/x.com\/MedtechIng","https:\/\/www.instagram.com\/medtech.ingenieure\/","https:\/\/www.linkedin.com\/company\/37871229\/"]},{"@type":"Person","@id":"https:\/\/medtech-ingenieur.de\/#\/schema\/person\/8bdea6549218b62b5ec7c4c145a5c74a","name":"Goran Madzar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2025\/04\/cropped-Med_Mit-032-scaled-1-96x96.jpg","url":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2025\/04\/cropped-Med_Mit-032-scaled-1-96x96.jpg","contentUrl":"https:\/\/medtech-ingenieur.de\/wp-content\/uploads\/2025\/04\/cropped-Med_Mit-032-scaled-1-96x96.jpg","caption":"Goran Madzar"},"description":"A passionate MEDtech engineer! My team and I provide engineering services to medical technology manufacturers to help them develop and market their products! Feel free to contact me via LinkedIn or email. I look forward to meeting you.","sameAs":["https:\/\/medtech-ingenieur.de\/author\/gmadzar\/","https:\/\/www.facebook.com\/medtechIngenieur\/","https:\/\/x.com\/https:\/\/twitter.com\/MedtechIng"],"url":"https:\/\/medtech-ingenieur.de\/en\/author\/gmadzar\/"}]}},"_links":{"self":[{"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/posts\/5599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/comments?post=5599"}],"version-history":[{"count":7,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/posts\/5599\/revisions"}],"predecessor-version":[{"id":5774,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/posts\/5599\/revisions\/5774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/media\/5707"}],"wp:attachment":[{"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/media?parent=5599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/categories?post=5599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/medtech-ingenieur.de\/en\/wp-json\/wp\/v2\/tags?post=5599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}