Feeds

Network failure closed hospitals to ambulance admissions

UCLH launches investigation after a network glitch

Security for virtualized datacentres

University College London hospitals trust (UCLH) has launched an investigation after a network glitch led to the closure of A&E to blue light traffic. The problem also led to cancellations of operations.

The trust was last month forced to halt a number of services, including the cancellation of 50 per cent of its operations, due to a faulty network switch. The faulty switch left computers across the trust unable to access various systems such as the trust's patient administration system and its IDX patient records software CareCast.

A spokesman for the trust said that the network-wide incident occurred during the early hours of 22 February. He explained that UCLH was required to implement its business continuity plans, which included paper-based procedures, "in order to maintain business as usual".

"Patient safety was at no stage compromised. In agreement with the London Ambulance Service, blue light patients were diverted to other hospitals for about 10 hours throughout the day. However our emergency department remained open to walk-in attendances," he said.

According to a report for directors published on 9 March 2011, the trust's ICT team together with external IT experts had to systematically disable individual sections of the trust network – including the connection to its primary data centre – in order to isolate the faulty component, which was "extremely complex and took a considerable time".

The problem was resolved within 24 hours, with the faulty equipment replaced by Logica, the supplier which maintains the trust's data network.

A full investigation into the network design and components is being undertaken to verify if there are any design issues to be addressed. An external lead investigator is being appointed from private firm RSM Tenon.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Internet Security Threat Report 2014

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Desktop Linux users beware: the boss thinks you need to be managed
VMware reveals VDI for Linux desktops plan, plus China lab to do the development
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.