Every single one of the 200 NHS trusts so far assessed for cyber security resilience has failed an onsite assessment, MPs on the Public Accounts Committee were told yesterday.
There are a total of 236 trusts. There is no timeline on when the remaining thirty-six will be checked over.
In a hearing about the WannaCry incident last June, entitled “Cyber-attack on the NHS”, Rob Shaw, deputy chief exec of NHS Digital, denied it was the case that those bodies who didn’t get a passing grade had not done anything over cyber security.
On the NHS tech team? Weep at ugly WannaCry post-mortem, smile as Health dept outlines plan
He said: “The amount of effort it takes for NHS providers in such a complex estate to reach the cyber essential plus standard that we assess against… is quite a high bar. Some of them have failed purely on patching, which is what the vulnerability was around Wannacry.”
He added: “Some of them need to do a considerable amount of work, but a number of them are on a journey [to] meeting that requirement.”
Shaw said NHS Digital “may want to consider whether to re-inspect those at the highest risk, now we have the additional funding.”
Will Smart, chief information officer at NHS Improvement, said that since the incident £21m has been invested in improved cybersecurity, while another £150m has been identified to improve national systems and resilience over the next two years.
He said “further reprioritisation and additional investment for cybersecurity is being considered”.
Smart declined to say how many organisations were still at high risk, citing security concerns. However, he said it was those organisations who had not been affected by WannaCry but were complacent about their practices that were the ones he was “most worried about”.
Smart published a review last week setting out 22 recommendations of the lessons learned around WannaCry. He told MPs having appropriate standards in place across the NHS to enhance resilience and appropriate governance in place to prevent it from happening again were his “top priorities”.
In October, the National Audit Office said the NHS could have fended off WannaCry “if only it had taken simple steps to protect its computers”, but failed to heed warnings from CareCert about falling victim to a cyber attack a full year before that incident happened.
Chris Wormald, Permanent Secretary at the Department of Health, said a national response strategy was due to be tested in response to a cyber attack, but said the incident occurred before the NHS had a chance to trial it.
Before the WannaCry attack, the Department of Health had work underway to strengthen centralised cyber-security in the NHS.
NHS Digital’s CareCERT has a system for broadcasting alerts about cyber threats, providing a hotline for dealing with incidents, sharing best practice and carrying out on-site assessments to help protect against future cyber attacks.
NHS England had embedded the 10 Data Security Standards in the standard NHS contract for 2017-18 and was providing training to its Board and local teams to raise awareness of cyber threats, it said. ®