The NHS was just one area that came under a serious cyber security attack last week, when tens of thousands of computers, spread over 100 countries were brought down by a ransom attack which uses software known as ‘WanaCrypt0r 2.0 or WannaCry’. The suspicious malware that seemed to be using stolen technology from the National Security Agency in the US, infiltrated computers across the world, targeting hospitals and surgeries here in the UK and global organisations such as FedEx in the US and Telefonica in Spain and Portugal.

The WannaCry software is recognised to attack computers that are known to be running old versions of Windows including XP; which is no longer supported by Microsoft. Versions of Windows 8 or 10 was also attacked, where updates had not been activated.

A cyber security attack is capable of bringing down vulnerable systems

Last year, the software company Citrix obtained information from the Freedom of Information Act, which suggested that 90% of NHS trusts were running obsolete systems such as Windows XP which is over 15 years old, to carry out daily duties.

Despite documents being unavailable and ambulances being cancelled or diverted across 50 NHS trusts, luckily no patient information was accessed or compromised.  Microsoft were quick to respond with patches to repair systems and protect from further harm, whilst security experts have re-iterated that it is important that organisations and businesses keep up to date with the latest operating systems and ensure that updates are routinely executed. The security challenges we face now are very different from 15 years ago and so it is vitally important that we make sure our computers are protected.

Are you in charge in cyber security attack operations for your business or organisation? We work with Directors and Departmental Managers to provide the very best in cyber security attack insurance to protect businesses, individuals and their equipment. By filling out our cyber security questionnaire we can determine your level of responsibility as an organisation and iron out any loop holes or problems you may be facing in relation to cyber security. Please contact us to find out further information on protecting against a cyber security attack.

Blogs used to write this article: