During May 2020, 113 NHS email accounts were attacked by phishing emails due to vulnerable cyber security. The NHCS has confirmed that the incident was part of a much wider attack on UK organisations and sadly yet again, the NHS fell victim to cyber security vulnerabilities when affected accounts were able to access sensitive patient data which may have included medical records.

This comes at a crucial time when the NHS has faced added pressures in managing and making progress to minimise the COVID pandemic. In addition, other public invested organisations such as councils and government departments have also endeavoured to adjust to remote home working which has highlighted a significant rise in vulnerable cyber security across Public Authority organisations. Cyber crime has been especially prevalent, where staff are working from home and especially where they operate IOT devices on home WIFI networks, such as domestic smart appliances which don’t have secure endpoints. Often this situation opens a gateway for cybercrime to rapidly activate across networks which causes mayhem within IT systems; a vulnerable cyber security issue that has accelerated over recent months.

Phishing emails are a huge part of this and rely on the naivety of employee’s IT experience. By posing as something that seems to be authentic, phishing emails can direct employees to allow access or enter secure information into illegal systems whereby they can use the information for other criminal means.


Vulnerable cyber security – how to secure systems

Is your company concerned about vulnerable cyber security issues and are you looking to protect IT systems across a number of departments? Working closely with Managers and Cyber Security advisors within local authority organisations and businesses, here at Crendon Insurance we support multi-departmental organisations and businesses with cyber security insurance to protect against vulnerable cyber security. To find out more please contact our team or see our cyber attack insurance website pages for further details.

Blogs used to write this article: