Close this search box.

Technology can help Singapore healthcare, but there are challenges

Singapore ranks high when it comes to first-class healthcare. In fact it ranks second worldwide in providing quality healthcare. But with a rapidly growing elderly population – 610,000 people aged above 65 in 2020 – there are new challenges ahead. The government of the Asian city state wants to embrace innovative technology to meet these challenges. But there are some bumps in the road ahead, Jeffrey Kok writes in a column for Singapore Business Review.

Singapore needs more healthcare workers to help Singapore with its aging population. 30.000 more are needed by 2020. Technology can help as an alternative to at least some of these hard to find workers. This technology includes everything from “intelligent” blood-sensitive bandages for dialysis patients, to robots that help stroke patients exercise or keep dementia patients occupied. In the operating theatre, robotic laparoscopic surgery has become relatively commonplace.

This is only part of technological  changes. The Internet of Things and big data is driving positive disruption worldwide in healthcare and other industries; in Singapore, a few institutions are already examining how mobility might save time, money, and trouble for procedures that don’t need an in-person visit. But there is a catch, Jeffrey Kok believes: here are warning signs on this expressway to digital health management that must not be ignored.


One catch is this: more digital data means more possibilities for cyberattacks.  According to Kok, in last year’s CyberArk Global Advanced Threat Landscape Survey, 61% of the survey respondents from the U.S., Europe (France, Germany, and United Kingdom), Israel, and Asia Pacific (Australia, New Zealand, Singapore) stated  that attacks impacting healthcare and hospital services are viewed as potentially the most catastrophic threat.

IoT devices easily hacked

The main concern here is the ease with which IoT devices can be hacked. IoT devices are potentially the most vulnerable targets for cyber attackers today, for the very nature of their connectedness, the personal information they store, and the general lack of security protocols.

IoT devices, like all digital technologies, come with administrative privileges to provide a certain level of security. However, we often overlook the need to change the factory default password on such devices – and default passwords are elementary and easy to hack

Potential damage

The potential damage from hacked IoT devices includes the loss of personal, private patient data, as well as provide a gateway into the larger hospital system. Certainly, online repositories of data enable nurses and other professionals to easily provide advice remotely, but what if cyber attackers should get access to such data?

What’s more, the abovementioned survey revealed that 53% of the organisations (across all sectors) surveyed still store privileged and administrative passwords in a Word document or spreadsheet, whilst 39% use a shared server or USB stick. These passwords are easily stolen or lost.

A further threat is allowing third-party vendors access to internal networks. Organisations often overlook remote access controls, leaving an open door into the network. Singapore is the worst performer in this area, with 26% of Singaporean enterprises neglecting to secure third-party vendor access and 33% not monitoring at all.

Shared responsibility

Kok doesn’t just state possible threats, he also comes up with some counter measures: well-defined steps that organisations can take to manage these risks. For one thing: allowing IoT devices to communicate openly and freely can no longer continue. Whilst it is the responsibility of the vendors to make securing their devices easy – and industry-enforced standards and regulations may be necessary to enforce these practices, administrative privilege must be managed by both the customer and vendor.
Staff training is another critical area.

A study by Ponemon Institute recently reported that 56% of security practitioners surveyed said company insiders are the primary cause of security breaches – not due to malicious actors, but simply bad security habits (like storing passwords in Word documents). The first line of defence against the well-intentioned insider is awareness and training. All employees should be educated to understand the risks, organisational policies, and the reasons for those policies.

Other areas of concern

Privileged accounts are another area of concern, says Kok. The lack of accountability and protection of privileged accounts is most often exploited by cyber attackers. The benefits of protective controls and detection capabilities on privileged accounts and credentials should not be overlooked, as part of a comprehensive security strategy.

‘Finally, consumers must play their part by a determined and consistent effort to adopt best practices. These include changing default passwords on IoT devices, keeping firmware updated, choosing more secured & supported IoT devices, being aware of phishing attacks, and avoiding sharing of private information and passwords.’


ICT&health World Conference 2024

Experience the future of healthcare at the ICT&health World Conference from May 14th to 16th, 2024!
Secure your ticket now and immerse yourself in groundbreaking technologies and innovative solutions.
Engage with fellow experts and explore the power of global collaborations.

Share this article!

Read also
Pioneering Cardiac Arrest Detection for Enhanced Survival.
CardioWatch Revolutionizes Cardiac Arrest Detection
Dr. Oscar Díaz-Cambronero, Head of Perioperative Medicine Department at La Fe Hospital, spearheads innovative telemonitoring initiatives revolutionizing patient care
Smartwatches Saving Lives Inside and Outside the Hospital
EIT 2024
EIT Awards 2024. Two European startups are revolutionizing the treatment of cardiovascular diseases
Bertrand Piccard, Swiss explorer and founder of the Solar Impulse Foundation
EIT Summit 2024. What are the trigger points that drive or inhibit innovation?
MMC pioneers wireless monitoring for premature infants with the innovative Bambi Belt, revolutionizing care with improved comfort and mobility.
Wireless Monitoring of Vital Signs in Premature Infants at Máxima MC
Data protection-critical incidents resulting from human error are often rooted in stress, routine, negative attitudes toward IT, and deficits in employees' identification with the healthcare facility.
How cyberpsychology helps prevent human errors leading to data leaks
What technologies will enter our homes in a few months? ICT&health checked it out at the CES 2024.
CES 2024: Meet the exciting innovations for health and well-being
An article on a new study on e-health assessment tools
eHealth success lies at the intersection of technology, people, and organization
Unlocking the Future: Professor Sylvia Thun, a trailblazer in healthcare interoperability, discusses the crucial role of seamless data exchange in revolutionizing medicine and empowering individuals with comprehensive access to their health data.
Seamless data exchange will unlock the long-awaited benefits of digitalization
Medical facilities should proactively integrate new technologies into workflows to improve the quality of care.
Five areas of digitalization that healthcare providers should focus on in 2024
Follow us