Vast majority of NHS trusts have failed cyber security assessment, Brit MPs told

Don't panic, Captain Mainwaring!

By Kat Hall


Every single one of the 200 NHS trusts in the UK so far assessed for cyber security resilience has failed an on-site assessment, MPs on the Public Accounts Committee were told yesterday.

There are a total of 236 trusts. There is no timeline on when the remaining 36 will be checked over.

In a hearing about the WannaCry incident last June, entitled "Cyber-attack on the NHS", Rob Shaw, deputy chief exec of NHS Digital, denied it was the case that those bodies who didn't get a passing grade had not done anything over cyber security.

On the NHS tech team? Weep at ugly WannaCry post-mortem, smile as Health dept outlines plan


He said: "The amount of effort it takes for NHS providers in such a complex estate to reach the cyber essential plus standard that we assess against... is quite a high bar. Some of them have failed purely on patching, which is what the vulnerability was around Wannacry."

He added: "Some of them need to do a considerable amount of work, but a number of them are on a journey [to] meeting that requirement."

Shaw said NHS Digital "may want to consider whether to re-inspect those at the highest risk, now we have the additional funding."

Will Smart, chief information officer at NHS Improvement, said that since the incident £21m has been invested in improved cybersecurity, while another £150m has been identified to improve national systems and resilience over the next two years.

He said "further reprioritisation and additional investment for cybersecurity is being considered".

Smart declined to say how many organisations were still at high risk, citing security concerns. However, he said it was those organisations who had not been affected by WannaCry but were complacent about their practices that were the ones he was "most worried about".

Smart published a review last week setting out 22 recommendations of the lessons learned around WannaCry. He told MPs having appropriate standards in place across the NHS to enhance resilience and appropriate governance in place to prevent it from happening again were his "top priorities".

In October, the National Audit Office said the NHS could have fended off WannaCry "if only it had taken simple steps to protect its computers", but failed to heed warnings from CareCert about falling victim to a cyber attack a full year before that incident happened.

Chris Wormald, Permanent Secretary at the Department of Health, said a national response strategy was due to be tested in response to a cyber attack, but said the incident occurred before the NHS had a chance to trial it.

Before the WannaCry attack, the Department of Health had work underway to strengthen centralised cyber-security in the NHS.

NHS Digital's CareCERT has a system for broadcasting alerts about cyber threats, providing a hotline for dealing with incidents, sharing best practice and carrying out on-site assessments to help protect against future cyber attacks.

NHS England had embedded the 10 Data Security Standards in the standard NHS contract for 2017-18 and was providing training to its Board and local teams to raise awareness of cyber threats, it said. ®

Sign up to our NewsletterGet IT in your inbox daily


More from The Register

Acronis: Ransomware protection! Get yer free ransomware protection!

Windows-only but sure, thanks

UK white hats blacklisted by Cisco Talos after smart security code stumbles

Cisco gracefully says it won't charge for the privilege

Acronis adds automated ransomware protection to latest Backup version

Blockchain for data integrity and regulatory compliance

WannaCrypt NHS victim Lanarkshire infected by malware again

Infect me once, shame on you. Infect me twice…

She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty

She'll make you live her crazy life, but she'll take away your pain like a bullet to your wallet

Q. What connects the global financial crisis, Ursnif malware, and Coldplay's Viva la Vida?

A. Bad things from 2008 we can't seem to shake

Malware-flinger stingers, indexing and ever-changing data access patterns

Roll up, roll up for an end-of-holiday storage roundup

Don't worry, Eugene Kaspersky. Acronis is just busting a security move...

Analysis Oh and a touch of HCI, says data protector as it waltzes into adjacent markets

Fancy Bear still Putin out new modules for VPNFilter malware

Talos turns up obfuscation, lateral attacks, and proxies

Russian malware harvesting Telegram Desktop creds, chats

Python programmer may have outed himself on YouTube