How Theranos Hurt the Entire Medical Tech Industry

Medical Tech Industry

The medical field is no stranger to fraud. With so much money changing hands on a daily basis, there are bound to be a few individuals who try to take advantage of the situation.

But one of the most recent developments, involving more than $700 million and Elizabeth Holmes, founder of Theranos, is one of the most significant cases to date. It’s expected to have considerable fallout throughout the entire medical tech industry.

What Happened?

Medical Tech Industry

(Source: Wikipedia)

Founded by Holmes in 2003, Theranos quickly developed a reputation for their alternatives to traditional medical testing products. Although she was only 19 years old at the time, she quickly led her company to reach a height of $9 billion in market value.

But Theranos’ success was short-lived. A 2015 report, published in the Wall Street Journal, accused the young enterprise of misrepresenting their products. The expose shed light on their flawed technology and testing procedures, which ultimately resulted in Theranos voiding two years of blood samples.

The report unveiled another bombshell, too — the accusation that Holmes cheated on her required CLIA proficiency exams. Such discrepancies eventually led to new investigations by other media outlets, including the likes of The New Yorker, Fortune and The Financial Times, which uncovered further misdeeds.

She has since been charged with federal wire fraud and has resigned as the CEO of Theranos.

The iPod of Healthcare?

While fraud is rampant in some areas of medical tech, the field is often prone to errors — legitimate mistakes do occur. It’s been reported that 80 percent of all medical bills contain errors such as duplicate statements, incorrect patient or provider information, missing denial codes or claim numbers and more.

But Elizabeth Holmes made significant errors right from the start. While she was savvy enough to model her public image after Apple’s founder, Steve Jobs, she failed to mimic his business prowess.

Although she even went as far as adopting his signature black turtleneck for public appearances, she insisted on personally leading Theranos — which is something that Jobs never did with Apple.

She also failed to maintain a realistic vision for Theranos and their future products. Jobs succeeded because he understood the technology needed for devices like the iPod.

Although the technology existed, no one had ever assembled it in that way — and that’s really where Steve Jobs shined.

Instead, Holmes set her sights on brand new projects involving technology and methodologies that didn’t exist. She was trying to tread new ground in an area she didn’t fully understand or appreciate.

While she referred to a new blood testing product as the “iPod of healthcare,” she had no clear path of progression to reach that goal.

How Will This Affect Future Medical Tech Investments?

Holmes’ misrepresentation and subsequent misdoings have left a sour taste in the mouth of some investors. As pointed out by Michael Greeley, a general partner with Flare Capital Partners, investors are bound to lose faith in new medical tech.

As Greeley pointed out in a recent interview, dozens of investment firms were in medical tech a few short years ago. The number continues to drop significantly, and experts expect further disinterest. Although the situation is grim, Greeley stressed he cannot directly attribute this to Holmes or Theranos — yet.

Moving Forward

While breakthroughs like the Internet of Things (IoT), artificial intelligence (AI) and machine learning will continue to evolve and shape the technological development of the medical industry, there’s no telling how much this advancement will suffer because of the Theranos scandal.

It’s hard to imagine a scenario where investors pull out of medical tech entirely, but they’ll certainly think twice before putting their money on the line in the coming weeks, months and years.

By Kayla Matthews

Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
Dmitry Chekalin
How Much Should a Modern Website Cost? A website is a valuable instrument for growing your business. Your website presents your brand to users. Also, it compels your prospects to become your customers. So, how ...
Brian Rue
What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.