News0 min ago
Russian Criminals Behind Hospitals Cyber Attack
//Russian hackers are behind the cyber attack on a number of major London hospitals, according to the former chief executive of the National Cyber Security Centre.
Ciaran Martin told BBC Radio 4's Today programme that the criminal group were "looking for money" by targeting the pathology services firm Synnovis.
Hospitals declared a critical incident on Tuesday after the ransomware attack, which affected blood transfusions and test results.
It also led to operations being cancelled and emergency patients being diverted elsewhere.//
https:/
How simple it is to bring chaos. Time for a return to the relative safety of a back-up of paper files?
Answers
No best answer has yet been selected by naomi24. Once a best answer has been selected, it will be shown here.
For more on marking an answer as the "Best Answer", please visit our FAQ.// Internal documents leaked to Corporate Watch in August 2014 indicate that the company overcharged the NHS for diagnostic tests. A 2013 internal audit by Guy's into three of the 15 laboratories run by Viapath found its invoicing and billing systems were “unreliable” and contained “material inaccuracies”, amounting to an overcharge of £283,561 over a sample three-month period. A variety of complaints by clinicians were recorded, centring on a policy of employing staff who were less experienced and less expensive. In a review of its first four years, marked “strictly confidential”, Chief Executive Richard Jones admitted that it had “achieved much less than hoped” and that “initial attempts at transformation were badly handled and ended up costing money rather than saving it”. //
11:40 "My point is when systems go down everything stops. With hard back-up, that needn't happen" - it need not happen if the organisation has a good DR setup. We have DR sites that we flip flop every six months. If one got nuked we could switch to the other in a matter of minutes. Though that would be least of our worries!
Paper files? Why not go the whole hog and use tablets of stone with a chissel?
As TTT says the security is the problem, so many Public sector departments dont have the first clue. Neither do they have any clue when negotiating contracts. Hapless the lot of them.
One way round this would be to have the NHS on a hard backbone. i.e. no internet. But that costs of course and its far better to spend money on huge manager salaries and diversity champions.
//It is those outside contractors that have been remiss in this hack.//
No. The contract should state the requirement, the Vendor Manager should ensure it is done and the QAT/UAT teams should test. There should also be an indpendant PEN test organised by the Vender Manager (Civil service) to ensure compliance.
There is no getting around it, in this case Hospital Trusts are utimately resonsible (Just as Venables was/is for the scandal)
Related Questions
Sorry, we can't find any related questions. Try using the search bar at the top of the page to search for some keywords, or choose a topic and submit your own question.