NHS suppliers urged to sign cyber security best practice charter
- 16 May 2025

- Suppliers to the NHS have been urged in an open letter, published on 15 May 2025, to sign a charter of cyber security best practice
- It has been signed by Mike Fell, director of cyber operations at NHSE, Phil Huggins, national CISO at the Department of Health and Social Care, and Vin Diwakar, national director of transformation at NHSE
- Steps that suppliers are asked to take under the charter include ensuring effective 24/7 cyber monitoring is deployed and working ācollaboratively, openly and in partnership with NHS Englandā if a cyber attack occurs
Suppliers to the NHS have been urged to sign a charter of cyber security best practice to show their commitment to being trusted and secure partners to the health system.
An open letter, published on 15 May 2025, has been signed by Mike Fell, director of cyber operations at NHS England, Phil Huggins, national chief information security officer at the Department of Health and Social Care (DHSC), and Vin Diwakar, national director of transformation at NHSE.
The charter requests suppliers to take steps which include maintaining support for systems, applying patches to known vulnerabilities, applying multi-factor authentication to networks and systems, and keeping āimmutable backupsā of critical business data.
Further requirements laid out are around ensuring effective 24/7 cyber monitoring is deployed, logging critical IT infrastructure, reporting to NHS clients in a timely manner, and working ācollaboratively, openly and in partnership with NHS Englandā if a cyber attack occurs.
In a LinkedIn post on 15 May 2025, Fell said: āThe complexity of cyber security and the NHSās supply chain alongside the endemic criminal cyber threat faced by the UK make partnership crucialā.
āThis letter outlines our commitment to enhancing cyber security and ensuring the safety of our digital infrastructure.
āCollaboration through our supply chain is crucial and we must work together to protect healthcare and defend as one.
āToday we are setting out our expectation, abstract of contractual terms, of the key things required to help harden our systems and protect delivery of care.ā
A self-assessment form will be launched in autumn 2025 where suppliers can sign the charter, allowing time for them to work through the eight statements outlined in the open letter and be ready to commit.
There are also a series of supplier summits and engagement opportunities scheduled to help suppliers understand how they can collaborate on keeping the NHS safe from and resilient to cyber attacks.
In April 2025, the government published its plans for the Cyber Security and Resilience Bill, which requires more organisations and suppliers, including data centres, managed service providers and critical suppliers, to meet robust cyber security requirements.
The legislation is intended to prevent attacks similar to the Synnovis ransomware attack in June 2024, which impacted London pathology services and lead to at least two incidents of severe patient harm.
In response to the open letter, Darren Williams, chief executive and founder of ransomware prevention firm and BlackFog, said: āRansomware attacks on healthcare organisations continue to pose a significant risk ā not just operationally, but also in terms of real human impact.
āFor threat actors, sensitive data is the ultimate target and NHS suppliers are custodians of vast volumes of highly confidential information.
“In Q1 alone, healthcare was the most targeted sector by ransomware attacks globally, with 57 recorded incidents.
āItās no surprise, then, that the NHS is urging its suppliers to step up their cybersecurity practices in response to escalating threats across the supply chain.
āGiven the spate of ransomware attacks that has impacted both public and private sector, initiatives which incentivise providers are a necessary step.ā