Tag: WannaCry

Welsh civil servants saw off WannaCry

SiluresAs the WannaCry ransomware hit the UK NHS it seems that Welsh hospitals were saved because they did not rely on private enterprise.

In a move that flies in the face of the “private sector fixes everything better” the NHS Wales Informatics Service is public service organisation, which supplies more than 70 software services to users across NHS Wales.

Upon catching wind of the WannaCry attack, a major incident room was set up at the service’s Cardiff office – one of five in Wales – and additional monitoring was ordered across the country.

A spokeswoman from the service said: “At the NHS Wales Informatics Service we constantly provide real-time monitoring of NHS Wales’s digital services and IT systems, all of which are designed to have strong security measures.

“In addition we immediately put in extra security controls and co-ordinated the effort to protect our national and local systems, liaising closely with senior management from across NHS Wales.”

The team blocked all external emails sent to NHS Wales and applying new anti-virus definitions and patches to both national and local systems.

“Where the ransomware has been detected, immediate remedial action has been taken to prevent the spreading of the virus. This has ensured that no patient data has been compromised or lost.”

In the case of the NHS in England and Scotland, the use of connected networks – linking GP surgeries to main hospital infrastructures – meant that the virus could navigate it with relative ease. But there were no reports of the incident impacting on patient care anywhere in Wales.

But the Welsh success is making all the private sector deals in England look a bit weak.

NHS Wales was in fact attacked by the virus but monitoring software and processes identified each attack, allowing the Informatics Service to isolate and kill the virus.

In total, 37 computers were investigated as being suspected of having the virus but only seven were infected with the malware out of 55,000 computers in use across NHS Wales.

The Informatics Service are urging suppliers and partners to ensure that local systems are protected and that staff remain aware of the “on-going need” to protect the IT systems.


Security vendors are happy about WannaCry

drama-masksSecurity companies have seen their share prices rise sharply amid expected increase in spending on IT security after the WannaCry hack

The ransomware attack that disrupted the NHS and businesses around the world has led to a boom in share prices of cybersecurity companies – even the firm used by the health service to protect it against hackers.

Governments and companies expected to increase spending on IT security after being caught out by the attack, cybersecurity firms have seen their stock market values climb sharply over the past two days.

Sophos, a cloud network security specialist which counts the NHS among its clients, have jumped by about eight percent. Of course, it had to make a few changes. The claim on the company’s website that “the NHS is totally protected with Sophos” was changed to “Sophos understands the security needs of the NHS”.

Last week, the company tweeted its “top five tips for securing NHS organisations”. But its shares have been performing well over recent months because of the increased need for cyber defences.

NCC group added five percent to its share valuation and cyber consultancy group ECSC surged 42 percent. ISE, a fund invested in cybersecurity businesses, added nearly four percent.

All this is because corporates have suddenly woken up to the fact that they need to spend some cash on IT security and it is probably a daft idea to keep all those Windows XP machines running for the great unwashed while top execs get Microsoft Surfaces.

Sophos already gives services to the healthcare industry and is looking to increase selling to the sector in the aftermath of the attack.

FireEye’s prices have risen seven percent, Symantec up more than three per cent and Palo Alto Networks 2.7 percent.

The success of the WannaCry hack could make other attacks more likely in the future amid doubts over governments’ ability to secure “cyberweapons” from theft.