Trusts told to remain vigilant with updated cyber-attack guidance

The Wanna Cry ransomware notice.       gigi.h  Twitter

The Wanna Cry ransomware notice. gigi.h Twitter

Some 47 NHS trusts fell victim to these ransomware attacks resulting in devastating consequences for some patients, as operations were cancelled and medical records held for ransom.

The organisation also recommended that trusts ensure security software patches were up-to-date and that up-to-date virus software was also being used.

The University Hospitals of Morecambe Bay NHS Trust issued this statement on Sunday: "As you may be aware, despite national IT issues, our hospitals are running as normal".

On Monday and Tuesday issues still remained and blood tests at the four hospitals are "unavailable until further notice".

At a hospital in Norfolk, eastern England, staff were told on Monday they could still only view x-rays in one room, while pharmacy services were being restricted as computer systems were upgraded.

Join us today as we discuss the impact of the Ransomware attack and how Google is influencing our schools.

"Additional steps continue to be taken to protect NHS IT systems and we would like to thank National Wales Informatics Service (NWIS) and IT teams across the NHS who have been working tirelessly over the weekend".

Chelsea boss Antonio Conte has taught John Terry a lesson
In the same media conference, a reporter made known to Conte that Diego Costa ventured to the press room at half time for snack. Twenty-nine games have already been won, and Conte hailed that as a "great, great achievement", but still wants more.

"If your business has been infected you should isolate the affected computer from your network to prevent the software spreading and use backup data to restore information'".

However, practices across the North East are still asking patients to consider delaying contacting their practice unless they really need to for the next few days to allow time to clear backlogs caused by the attack.

In a blog post, published by Brad Smith, president and chief legal officer at the company, on Sunday he said that the attack was enabled through National Security Agency (NSA) stockpiling exploits, rather than openly sharing discovered exploits so they could be fixed.

NHS Digital confirmed that the patch was made available on its cyber portal on April 25, and a link sent to NHS IT staff on April 27.

However, the note said that no GP practice computers had actually been infected by the malware.

She said it was an global attack with a number of countries and organisations affected.

The NHS has warned the appointments at hospitals and GP may be slower than normal while the disruption caused by the ransomware attack subsides.

Latest News