UK Hospital Systems Running Windows XP Are Taken Offline
The largest hospital group in the UK was the victim of an online attack, forcing them to take some of its systems offline.

The Barts Health NHS Trust is a system of three district general hospitals staffing over 15,000 employees serving 2.5 million patients in east London.
The Health Service Journal reports that the attack affected thousands of files hosted on the hospital group’s Windows XP operating system, and the file sharing system between departments has been turned off, according to the Telegraph.
Last year, ransomware attacks against Northern Lincolnshire and Goole Hospitals forced them to shut down systems and cancel operations for four days.
They were infected with a variant known as Globe2, which commonly infects users via phishing emails containing malicious links, according to ZDNet.
Protecting Healthcare Against Security Breaches
How can you protect your organization against ransomware and other online attacks against patient data?
Update your operating systems. The hospital group was running Windows XP, released in 2001 – over 15 years ago – and it has over 700 reported vulnerabilities logged in the CVE Details database.
Extended support for the OS ended in April 2014, which means it no longer receives security updates. That means it’s an easy target for attackers that exploit known software vulnerabilities in older systems to get access to hospital files.
According to Duo’s 2016 Trusted Access Report, the healthcare industry has twice as many Windows endpoints running XP than Duo’s average customers. And another 78% of the Windows endpoints in healthcare are running on the outdated Windows 7 OS, released in 2009.
Get visibility into your endpoints. Check the security health of every device that logs into your systems to ensure only Trusted Devices can access your applications and patient data.
Create custom device access policies to block risky devices based on what security features they’ve enabled, or what version of software they’re running to reduce the risk of ransomware infection.
Step up your authentication game. Add not only two-factor authentication (also known as multi-factor authentication) to your system logins, but invest in a solution with advanced user access policies to ensure only Trusted Users are granted access.
Run a phishing simulation. Since phishing emails are often the harbinger of ransomware, malware and other credential-stealing attacks, measure your organization’s level of risk and likelihood of getting phished by launching a simulated internal phishing campaign. Then use the data to identify risks and educate your employees. Learn more about Duo Insight, a free phishing simulator tool, and read our guide, The Trouble With Phishing to learn about risks.
Source
Search
Recent Posts

BSA mounts campaign vs unlicensed engineering, design software
It’s being launched amid reports of rampant use of unlicensed engineering and design software by practitioners in these industries.

Internet Explorer 11 has retired and is officially out of support – what you need to know
After 25+ years of helping people use and experience the web, Internet Explorer (IE) has been officially retired.

Do you have an audit phobia? Here is what to do
With software audits on the rise post-Covid, it’s easy to develop phobias from the resultant chaos. Our SAM Director, May Turnbull, is here to remind you that you aren’t alone!

Broadcom announces plans to buy VMware in $61 billion deal
It will help the company diversify away from its core business of designing and selling semiconductors into enterprise software, which can have larger margins.