Feeds

NHS hospitals struggle to hold back the malware tide

Still ill

The Power of One eBook: Top reasons to choose HP BladeSystem

Malware infection problems at NHS hospitals are a more serious problem than isolated reports of infestation might suggest, according to an investigation by More4 News.

Last November an infection by the MyTob worm created huge administrative headaches at three London hospitals - Barts, the Royal London and the London Chest Hospital - that are part of the same NHS Trust. The infection forced the hospitals to briefly reroute ambulances and disrupted hospital administration while the infection was being contained. Some medical staff had to resort to pen and paper backup systems.

A subsequent inquiry blamed a failure to follow basic information security procedures for the infection.

Other incidents include infection by PCs at a Sheffield hospital with the infamous Conficker worm, as first reported by El Reg. Worse still it's now emerged that these two incidents are far from isolated cases, but are instead symptomatic of wider information security shortcomings across the NHS.

The issue is of particular concern because it arises at a time when the NHS is rolling out an £13bn electronic patient records system that will place greater reliance on IT systems in delivering patient care.

More4 News polled every NHS trust in England for information on whether they experienced a computer virus infection over the last financial year. The survey revealed that 8,000 computer viruses had infected NHS computers over the survey period and, more significantly, recorded 12 incidents where clinical departments had been hit. Three in four trusts responded to the survey.

The trusts obliged to deal with malware infections include Basingstoke & North Hampshire, Isle of Wight, Poole, Bradford Teaching Hospitals and Leeds Teaching Hospitals. The impact of viral infections varied.

In Newcastle, for example, a malware infection left staff unable to use administrative systems and resulted in a three week appointments backlog. A hundred admin workers were prevented from using their computers at Maidstone and Tunbridge Wells following a separate infection. By contrast, an infection at West Middlesex Trust only affected a single dictaphone, More4 News reports.

It adds that, in many cases, malware infection occurred because anti-virus systems were either disabled or not properly updated. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.