Back to Landing page

Product Security Advisories

Dexcom is committed to continuously improving the security of our products. We have implemented processes and programs that design security into our product development lifecycle. We monitor and enhance security as appropriate throughout the product lifecycle.
We understand the importance of protecting patient and partner data and have implemented security practices into the development and operations of our data services that deliver security, performance, and usability.
As part of our commitment to security and privacy, Dexcom continuously monitors and evaluates emerging cyber risks. When vulnerabilities are identified, we take prompt and appropriate action to mitigate them.
To protect the integrity and availability of our systems, we implement robust security controls to:
  • Safeguard sensitive health data
  • Ensure reliable product performance
  • Preventing unauthorized access or misuse
  • Maintain trust with patients, caregivers, and healthcare professionals
Cybersecurity is a core component of our product lifecycle and safety strategy. We encourage users to follow best practices and stay informed through our external security resources.

Security Best Practices Implemented at Dexcom

Recommended Mobile App Cybersecurity Controls

Use reputable anti-malware software to detect and block malicious software.
  • Configure network firewalls to control incoming and outgoing traffic.
  • Enforce strong password policies including regular updates and avoiding reuse.
  • Use reputable anti-malware software to detect and block malicious software.

Secure Communication Protocols

  • Use secure versions of TLS (Transport Layer Security) for web and API communications.
  • Implement secure pairing and encryption for Bluetooth Low Energy (BLE) communications.

Critical Function Protection

  • Monitor and restrict unauthorized code execution with runtime protection.
  • Validate application integrity to ensure they haven’t been altered or corrupted.

Data Protection Measures

  • Apply strong encryption algorithms to secure stored and transmitted data.
  • Use tamper detection mechanisms to identify unauthorized changes.

Threat Detection and Response Protocols

  • Monitor systems for suspicious activity using threat intelligence tools.
  • Define clear escalation paths and response procedures for identified threats.

Software Update Procedures

  • Schedule regular updates for operating systems, applications, and firmware.
  • Validate updates before deployment and ensure rollback options are available

Authentication and Access Control Guidelines

  • Use multi-factor authentication (MFA) for sensitive systems where feasible.
  • Apply role-based access controls (RBAC) to limit permissions based on job function.

User Awareness Resources

  • Offer accessible resources such as FAQs, quick guides, and helpdesk support.
At Dexcom, patient safety is paramount. We are dedicated to delivering products that are not only clinically effective for diabetes management but also resilient against cybersecurity threats.

Contacting Support

If you believe your Dexcom device or mobile app have been compromised, contact Dexcom Global Technical Support immediately.
You can reach support directly through the app by navigating to Profile > Contact, or by visiting our official Support page for your region or contact Dexcom’s 24/7 Technical Support via email at: https://www.dexcom.com/contact
Privacy PolicyTerms of Use

MAT-5161

© 2026 Dexcom, Inc. All rights reserved.

US flag

US