Dealing with recent cybersecurity risks

Dealing with recent cybersecurity risks

PSNC has reported news about a recent cyber attack and NHS Digital are providing updates on the attack on their website.

One way to help reduce cyber risks is to be suspicious of unsolicited emails and to be especially cautious of attachments or visiting website links within unsolicited emails.

About the “Wanna Decryptor” Ransomware

A number of NHS organisations have reported to NHS Digital that they have been affected by a ransomware attack. This attack was not specifically targeted at the NHS and is affecting organisations globally across a range of sectors.

Pharmacy teams may be aware of recent media reports which described how the  cyber attack has been affecting some  NHS computer systems.

The recent attack, which commenced around 12th May 2017,  is understood to involve ransomware called Wanna Decryptor, Wanna Cryptor, WanaCrypt0r, WannaCry or WCry. It has been  spreading quickly around the world and infecting Microsoft Windows XP, Vista and 7, 8.1 and 10 operating systems and Windows servers.

Once a system is infected, the ransomware may store malicious encrypted files on the infected computer.

If you believe your system has been impacted

If you believe a computer has been affected you should immediately disconnect the network cable/switch off WiFi network access and power the computer down, then contact your IT provider’s helpdesk.

Always consult your IT provider/helpdesk before taking any action that might affect your system.

If a computer on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network device the logged-in user has permission to access. For system administration accounts this may include backup storage locations.

Preventing ransomware attacks

NHS Digital advise that to avoid computers becoming infected with ransomware and to enable recovery, where a computer does get infected, pharmacy contractors should seek to ensure that:

  • A programme of education and awareness training is provided to staff to ensure they don’t open email attachments or follow links within unsolicited emails’
  • All operating systems, antivirus and other security products are kept up to date;
  • All day to day computer activities such as email and internet are performed using non-administrative accounts and that where administrative privileges are assigned, this is at the lowest level which allows the individual user to perform the functions that their role requires;
  • All critical data is backed up, and backups must be protected and kept out of the reach of ransomware; and
  • Multiple backups should be created on a regular basis, including at least one off-network backup (e.g. to tape).

The only guaranteed way to recover from a ransomware infection is to restore all affected files from their most recent backup.

Contractors should sign up to receive NHS Digital service alerts to their email account and mobile phone.

Read more about EPS and NHS IT business continuity measures

Return to IG and cybersecurity

Return to Pharmacy IT



Latest Contract & IT news

View more Contract & IT news >