Rob Shaw’s top 10 point cyber prevention tips

  • 17 July 2017
Rob Shaw’s top 10 point cyber prevention tips
Rob Shaw NHS Digital speaking at the King's Fund

The interim chief executive of NHS Digital has given his 10 point list on how organisations can help prevent cyber-attacks.

Speaking at the Kingā€™s Fund Digital Health and Care Congress on 11 July, Rob Shaw described the Mayā€™s WannaCry attacks as the ā€œhardest dress rehearsal of what could happen if things really went wrongā€ in a cyber-attack.

The WannaCry hackers exploited a known single Microsoft vulnerability which severely affected the NHS, with 20% of trusts affected. Ambulances were diverted, staff reverted to pen and paper processes and operations were cancelled.

Shaw said that the global attack has earnt the attackers $80,000, and that 300,000 machines were infected worldwide in 150 countries.

He again defended NHS Digitalā€™s role in responding to the attack, particularly through CareCERT, and added that 21 suppliers stepped up with ā€œgenuine offers of helpā€.

ā€œI think the NHS did remarkedly wellā€, said Shaw, ā€œI think we responded well but we could do betterā€.

Shaw said that security needs to be treated ā€œin the same way we treat safety, so if thereā€™s a near miss we report it and we encourage people to report itā€.

This escalation was echoed in the Governmentā€™s response to the Caldicott report, published 12 July, which wants cyber-security to be represented at board level, critical incidents reported sharply and a Ā£21 million fund given for cyber prevention at major trauma trusts.

He confirmed that no patient data was affected in the WannaCry attack.

Rob Shawā€™s top 10 things to check BEFORE the next cyber-attack:

  1. When did you last rehearse your incident plan?

Shaw described the first time NHS Digital did its incident plan, it was ā€œan absolute car crashā€ but that he had the luxury of planning ahead.

  1. Are your people doing what they need to do to maintain cyber resilience (patches, responding to alerts)?

The idea of ā€œpatch Tuesdayā€ was referenced by Shaw for organisations.

  1. Do you have a paper copy of your incident plan both on and off site and comprehensive contact lists for your incident team?

One trust apparently had put everything on the system as it was trying to go paperless, said Shaw, so have a copy in your brief case just in case.

  1. Does everyone in your incident team have the same?
  2. Is each member of the incident team clear about their role? Is there a tiered incident management structure?

When you get into a crisis people tend to act like headless chickens or go missing, said Shaw, so be clear on who has responsibility for what.

  1. Do you have escalation points for incidents of different severity? If in doubt, operate at the great severity level.

Have you got a gold, silver and bronze command, asked Shaw.

  1. Do you know the contact details of key incident management partners?

The trust needs to know the supplierā€™s named contacts to call in case of an emergency.

  1. Depending on the severity, agree the frequency of face-to-face meetings.

You need to allow the people who are doing the work to do the work, said Shaw.

  1. How will you communicate with your staff, the media and other agencies?

Shaw says the ā€œmedia can helpā€ by alerting patients to who and who hasnā€™t been affected in a cyber-attack.

  1. Patching and cyber hygiene is a vital first line defence, but thereā€™s no room for complacency.

Subscribe to our newsletter

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Sign up

Related News

Medefer refutes claim that security flaw left patient data vulnerable

Medefer refutes claim that security flaw left patient data vulnerable

Online healthcare provider Medefer has denied claims that its application programming interface (API) left NHS patient data vulnerable.
60% of NHS staff want more cyber security training, finds study

60% of NHS staff want more cyber security training, finds study

Research from BT found that only 36% of NHS staff surveyed believe that current cyber security measures are sufficient.
NHS Supply Chain selects Leidos as cyber security provider

NHS Supply Chain selects Leidos as cyber security provider

US-based IT and defence company Leidos has been appointed cyber security provider for NHS Supply Chain under a three-year contract.