Balabit named Representative Vendor in Gartner Mar... » NEW YORK CITY:  Balabit has been listed as a representative vendor in Gartner’s Market Guide for Use... Aricent and Rohde, Schwarz Cybersecurity unveil a ... » REDWOOD CITY, California/ Leipzig, Germany: Aricent, Rohde & Schwarz Cybersecurity have announce... TrapX deepens deception capabilities with Deceptio... » SAN MATEO, Calif.: TrapX Security has released version 6.0 of its DeceptionGrid™ platform. Version 6... Cloud infrastructure services providers comply wit... » Brussels: The Cloud Infrastructure Services Providers in Europe (CISPE)have declared that over 30 se... Armour Comms launches first secure Voice over IP... » London: Armour Communications has announced its integration with Skype for Business. Armour Mobile i... Anam Technologies selected by Deutsche Telekom a... » DUBLIN, BONN:  Anam Technologies has gone into partnership with Deutsche Telekom International Carri... 6.7 percent of programmes on private UK PCs are en... » Maidenhead, U.K: The average private user in the UK has 72 programmes installed on their PC, and 6.7... Multitone’s EkoSecure Personal Alert System chos... » Multitone Electronics plc has announced that its German-based team, Multiton Elektronik GmbH, has su... IoT 2020: Smart and secure IoT platform » Geneva, Switzerland: The Internet of Things (IoT) significantly impacts the global economy and is ex... Letterbox company to keep properties safe with inn... » A specialist mailbox manufacturer has made a pledge to enhance the security of UK properties through...

CLICK HERE TO

Talking Point Banner

Reports are surfacing that the largest NHS hospital trust in England has been hit with ransomware, affecting thousands of sensitive files. Cybersecurity experts react as below:

David Gibson, VP of strategy and market development at Varonis says: "The reported ransomware attack on the largest NHS hospital trust in England affecting thousands of sensitive files is another canary-in-the-coal mine incident raising awareness for how much sensitive data is overexposed and at risk within organisations. When a user with excessive access to data across the network is infected with ransomware, organisations cannot ignore the crippling effects of hijacked data – in this case, potential disruptions for patient care.

"Barts Health NHS have said they are following a contingency plan by taking offline the infected systems; however, they should be thanking the ransomware criminals for shining a big, bright spotlight on the holes in their defences that allowed in the ransomware in the first place. If ransomware can temporarily halt productivity because it was spotted and stopped too far into the infection, only image what a malicious insider or external actor with co-opted credentials can do to your organisation and how long they can go undetected. Organisations impacted by ransomware also means they are vulnerable to other types of attacks.

"Organisations should monitor their IT infrastructure, specifically users and the files and emails they can access, and then perform regular attestations of access rights to reduce unnecessary exposure. Additionally, organisations should employ a user behaviour analytics solution to look for and stop anomalous behaviour that indicates ransomware or other dangerous breaches."

Stephen Gates, chief research intelligence analyst at NSFOCUS, reacts: "In my predictions for 2017, (add link here) the increase of stealthy, modular ransomware capable of spreading laterally will be one of the primary cyberthreats organisations face in 2017 and beyond. Apparently, that prediction is proving to be true. Organisations will never be able to stop the dreaded “user click” that likely allowed the ransomware in to begin with. However, technology exists that can detect and defeat ransomware infections. The real question is, “Why do organisations continue to believe it will never happen to them, and why don’t they have the proper defences in place?” This is simply another testament that organisations are failing miserably in protecting themselves, their customers, and their data."

Jamie Moles, security consultant at malware detection firm Lastline comments: "The National Health Service is one of the largest organisations in the United Kingdom. With an annual budget in the region of £116 billion, it is a massive target for ransomware actors and currently, it’s a poorly defended target.

"There are a number of trusts in deficit and spending on the NHS has dropped in real terms since the recession. Priorities for all NHS trusts are unsurprisingly targeted at medical needs over and above admin and operational needs, but of course this includes IT Security.

"While security remains a low priority for NHS management, they will increasingly fall victim to these kinds of threats, which wouldn’t be a serious problem except it has previously resulted in cancellation of treatments whilst the affected systems are investigated and cleaned up. Interestingly, the NHS takes a very strict and sanitary approach to dealing with these threats, shutting down almost all of its IT capabilities while it triages and treats the problem. Why would we expect any different from a medical organisation?

"Moving forward if we are to prevent these issues causing delays to treatment and potentially deaths, NHS trusts are going to have to invest in technology to deal with Ransomware and other targeted malware based threats. There are plenty of good technologies available to assist in this issue and they can be scaled effectively and cost efficiently to cope with massive organisations like the NHS. Unfortunately, Antivirus is not one of them."