Date: 8 August 2024
A Warning Call for NHS Third-Party Security
The news of the ICO’s provisional decision to fine Advanced has brought to light the struggles of the NHS with its third-party service providers. The announcement comes only a few months after the NHS suffered a level-three critical incident due to a cyber attack on its pathology service provider, Synnovis.
Till date, the ransomware attack on Synnovis has postponed more than 5,000 acute outpatient appointments. This includes hundreds of operations for cancer treatments.
Cybersecurity experts are now highlighting the need for tighter Supply Chain security at the NHS and medical institutions worldwide.
Director of critical infrastructure at Illumio, Trevor Dearing, said the fine serves as "a wakeup call" to all suppliers to fortify their cybersecurity infrastructure.
He said, as per Computing.co.uk, "Supply chain security remains a significant challenge within the NHS as shown by the recent Synnovis cyber attack. In fact, when we reached out to 213 NHS Trusts under the Freedom of Information Act 2000 in July 2023, more than a quarter of Trusts had not conducted audits on their third-party suppliers' cybersecurity measures."
Get detailed insights into the NHS disruption this year in our Synnovis and NHS Ransomware Attack Timeline.
What Can You Do to Avoid Hefty Regulatory Fines?
The breach at Advanced and the subsequent news about the regulatory fine has once again highlighted critical shortcomings in cybersecurity measures, particularly in the healthcare space. It has underscored the urgent need for robust ransomware protection and cyber incident response training.
It also brings the conversation back to cybersecurity basics. Something as rudimentary as MFA, which all organisations must implement, can cost you millions of pounds. It is imperative to practise good cybersecurity hygiene. It is also critical to train your staff in cyber incident response and allow them practice for handling real-world incidents with cyber attack tabletop exercises.
Proper training can equip organisations to handle cyber threats more effectively, minimising the risk of data breaches and operational disruptions. The lack of preparedness and insufficient security protocols at Advanced significantly contributed to the severity of the attack and the subsequent fine.
Organisations must understand that without adequate ransomware protection and incident response training, their ability to withstand cyber attacks is severely compromised.
Conclusion
As the investigation into Advanced unfolds and the fine is finalised, stakeholders in the healthcare and data protection sectors will keenly observe the results. The cybersecurity community will also have all eyes on the steps Advanced takes to regain trust and bolster its security protocols.
Ultimately, the £6 million fine levied against Advanced Computer Software Group serves as a stark reminder of the vulnerabilities that exist within healthcare IT systems. It also underlines the devastating impact of ransomware attacks. Organisations must prioritise Ransomware mitigation measures and sensitive data protection to secure their finances and their business reputation. There’s simply no other choice today.