News: 1741604413

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

The NHS security culture problem is a crisis years in the making

(2025/03/10)


Analysis Walk into any hospital and ask the same question – "Which security system should we invest in?" – to both a doctor and a board member, and you may get different answers. The doctor chooses the system that leads to the most positive patient outcomes, while the board member chooses whichever solution is best for their increasingly stretched budget.

That's the opinion of NHS leaders right now, and therein lies one of the fundamental issues in building cyber resilience in the UK's National Health Service (NHS). It's a difficult fact to swallow, but the key industry decision-makers aren't making the most cyber-secure choices, and there are few incentives for them to do so.

The Register attended a roundtable discussion held between senior NHS IT and security folk recently, and contrary to popular belief, solving the healthcare security crisis can't be fixed simply by throwing more money at the problem.

[1]

It might help some hospitals to an extent, but the very idea that a fat cash injection could be a silver bullet for healthcare security was immediately met with unanimous headshakes from those in attendance. It's just not that simple.

[2]

[3]

The message was clear, however, that the country's NHS, beloved by all, revered around the world, and one of few shining jewels in the UK's otherwise splotchy crown, has a severe culture problem – at least when it comes to security. Go back to that first question and you can get a sense of what we mean.

When clinical decisions aren't made with consideration of the cybersecurity implications, the same attitude trickles down the wider organization, and insiders believe the NHS should take a leaf out of the finance industry's playbook. It would be doing so 30 years late, but there's no time like the present.

Does the answer wear a quarter-zip and gilet?

Cyber resilience is difficult to achieve even for organizations that don't have the financial difficulties of the NHS, or its disparate, often aging systems. The issue threatens the safety of all hospitals, especially if a ransomware payment ban – like the one [4]being considered in the UK – is passed into law.

The view among techies working in the UK's healthcare industries is that if board members were held personally liable for cybersecurity failures, a practice that's slowly increasing across the private sector, then the number of serious incidents would fall.

[5]

Attacks are on the rise, but the NHS continues to deal with the same security problems it was wrestling with a decade ago. Insiders doubt whether the organization has even learned anything from [6]WannaCry , let alone the various major attacks since.

The consultation period for the UK's proposed public sector ransom payment ban ends next month. Of the three proposals on the table, two would outlaw payments made in the public sector, including the NHS.

Hospitals will be without a legal route for paying off a ransomware gang. They generally don't in the UK anyway, which is partially why events such as the attack on Synnovis tend to be so disruptive. Hospitals would be left to rely on their backups, but what if they were corrupted during the attack. What if they weren't made recently enough?

[7]

Higher-ups within NHS Digital think the time has come to introduce personal liability for board members as a next step toward ensuring money is spent on achieving cyber resilience across the organization.

The idea is that such a measure would bring similar accountability to healthcare board members, like how the Financial Services and Markets Act (FSMA) 2000 helped transform the finance industry into the highly regulated, secure behemoth it is today.

The FSMA ushered in the Financial Services Authority, which later became the Financial Conduct Authority (FCA), whose broad work has in part led to the wider industry deploying systems robust enough to mitigate serious attacks.

Now we have rules introduced by the [8]Securities and Exchange Commission (SEC), plus regulations such as [9]NIS2 and DORA, all working to ramp up the pressure on executives to prioritize security or face legal consequences.

The UK's [10]Cyber Security and Resilience Bill (CSRB), announced in the King's Speech last year, aims to strengthen its existing NIS regulations and may also introduce personal liability provisions, although the consultation made no mention of it. The bill is expected to start progressing through Parliament later this year.

NHS doesn't help itself

The security folk inside the NHS would love to start building more cyber-resilient systems and future-proofing them from attacks, but one of the main inhibitors of long-term progress within the organization is the way it issues budgets to various departments.

IT consultants who go from working with banks that offer backing for long-term technology transformation plans for five or even ten years ahead, to the NHS where budgets are often issued for a single year only, say the inability to forward-plan a security transformation must change.

One leader said they were incredibly lucky to get a three-year period of committed funding for a frontline digitization project recently, which was seen as something of an oddity.

For most, however, it takes around the same time to even get projects off the ground. Even if the funding is made available, the number of different bodies and trusts required to sign off on major plans leads to long delays in progress. If whatever solution is being procured hasn't been paid for in full by then, the budget is taken away and no positive change is brought about at all.

[11]30-year-old NHS supply chain system hit by 35 major alerts in 11 months

[12]Already three years late, NHS finance system replacement delayed again

[13]Cyberattack on NHS causes hospitals to miss cancer care targets

[14]Ransom gang claims attack on NHS Alder Hey Children's Hospital

There is also a feeling among higher-ups that the NHS is bad at managing the contracts it dishes out, not keeping an eye on service level agreements and holding suppliers to account for failures. This has led to a distrust of vendors within the organization. Many believe vendors aren't acting in the NHS's best interest and ultimately contribute to its issues.

Handling a ban

Fundamentally, the security issues at the NHS aren't just monetary, although more robust finances would certainly help with its budgeting woes. It lacks a top-down security culture, one that makes the NHS's path to cyber resilience everyone's duty and simplifies the process of implementing security measures for those who are crying out for it.

It says a lot that healthcare insiders actually miss the COVID-19 pandemic, because during that time they say the NHS was, for the first time in their careers, agile enough to allow improvements to be made without the usual onerous approval stages.

Reinventing the way in which the organization does security may be the only way it could survive a ransomware payment ban should one be passed in the UK.

The topic remains a highly contentious issue with experts firmly divided about whether a ban should be introduced, or even if it's logistically feasible for in-scope organizations such as the NHS.

Without the ability to pay a ransom – again, not that the NHS is known to do so – its choices in a crisis become even more limited.

Hospitals generally manage well in these crises. Sure, stress levels are higher, and normal operations that are automated or digitized must be completed manually, yet - bar short-term interruptions - patients continue to be treated. Usually, care isn't affected too badly, although that's not true in [15]some tragic cases .

Whether a ban is introduced or not, the general consensus among [16]incident responders and [17]national security agencies is that organizations must be incentivized to improve their security. Whether it be via cyber insurers demanding more from policyholders, more stringent regulations, or a combination of multiple measures together, more needs to be done to force organizations to become more cyber resilient.

Those measures could come with the CSRB and it wouldn't be surprising if they did, given that all the other major regulations of recent times have included such provisions.

It's worth noting that, as with the ransom payment debate, there might not be total consensus on introducing board-level personal liability. However, strong voices within the NHS argue it could be a useful tool for improving its security culture.

If boards became responsible for every factor influencing security outcomes, and became personally liable for any failures, then it's highly likely that improvements will be seen, insiders argue. Saving one's bacon to get out of a security pigsty? Now there's an idea.

Insiders spoke freely during a recent discussion held under Chatham House rules, which allow reporting of what was said, but forbid identifying who said it.

Updated to add at 1227 UTC, March 10th

An NHS spokesperson said it was "increasing cyber resilience" across the organization and said "over £338 million has been invested since 2017 to help keep health and care organizations as safe as possible."

They said the org's "ambitious Cyber Improvement Programme will support the NHS to respond to the changing cyber threats, expand protection and reduce the risk of a successful attack."

Get our [18]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z88atheb0I4Tip_FruD6FwAAAAU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z88atheb0I4Tip_FruD6FwAAAAU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z88atheb0I4Tip_FruD6FwAAAAU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://www.theregister.com/2025/01/14/uk_ransomware_payout_ban/

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z88atheb0I4Tip_FruD6FwAAAAU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2017/05/20/wannacry_windows_xp/

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cso&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z88atheb0I4Tip_FruD6FwAAAAU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://www.theregister.com/2023/07/26/sec_reporting_security/

[9] https://www.theregister.com/2024/10/24/nis2_compliance_checklist/

[10] https://www.theregister.com/2024/07/30/uk_csr_bill_analysis/

[11] https://www.theregister.com/2025/02/27/thirtyyearold_nhs_supply_chain_system/

[12] https://www.theregister.com/2025/02/11/nhs_finance_system_delayed/

[13] https://www.theregister.com/2025/02/04/cyberattack_on_nhs_hospitals_sees/

[14] https://www.theregister.com/2024/11/29/inc_ransom_alder_hey_childrens_hospital/

[15] https://www.theregister.com/2024/07/05/qilin_impacts_patient/

[16] https://www.theregister.com/2024/05/12/ransomware_negotiator_payments/

[17] https://www.theregister.com/2024/05/16/ncsc_cto_broken_market_must/

[18] https://whitepapers.theregister.com/



Shambles for management

Khaptain

So what the article is basically saying is the the NHS needs a complete overhaul..

Those at the top are only thinking about their next paycheck and bonus..

Then it's time to start spraying some weedkiller and clearing up the garden

And I certainly don't see what any other country had to be envious about.

Re: Shambles for management

abend0c4

the NHS needs a complete overhaul.

One of the biggest problems with the NHS is that it keeps getting overhauled by what Robin Day [1]notoriously described in another context as "here today, gone tomorrow" politicians who depart leaving chaos in their wakes. Left to its own devices, the NHS is fairly self-organising, though it probably does need some external coaxing on things that not directly healthcare-related. The last thing it needs is another move of its various irreconcilable goalposts.

[1] https://www.youtube.com/watch?v=Sx1gWQacnEM

Re: Shambles for management

Anonymous Coward

The NHS isn't the problem. It's been the years or switching and changing the structure of the NHS by politicians. There is no unified set up from what I can see. It seems every trust and then all the GP's do their own things which creates even more complexities. The only way I can see of it getting fixed is to start by unifying the trusts in procurement and the systems they use. Pick one and apply to all in a controlled manner. That alone will save billions.

The cynic in me believes that politicians would love to see the NHS fail so they can sell it off to America because we aren't getting a favourable trade deal without it. They have already outsourced too much as it is. We saw this with British Rail. Run it into the ground till the public is begging for privatisation.

Doctor Syntax

Any security measures in the NHS are going to have to fight the NHS's ambitions to share data with .... well, who?

A while ago there there was some initiative to gather patient data into some sort of arrangement to be shared with researchers. With a scientific background and a clinical trials specialist in the family I wasn't against this but wanted more details before allowing my own data to be included. The first round of questions only brought forward answers that were so woolly as to raise more questions. The second round of questions were never answered.

Dr Paul Taylor

The "initiative to gather patient data into some sort of arrangement to be shared with researchers" was to hand over all of our very personal data to Palantir, owned by Peter Thiel, a mate of The Orange One.

So far as I am aware, this deal was signed off by the Tory "Government" and allowed to go ahead by the new one.

Besides giving all our private stuff to Palantir, the (basically useful) Patient Access website is inaccessible without Google "Capchas" and is now trying to force people to use authentication through Apple or Google.

They might as well have webcams in my GP's surgery connected directly to Trump and Putin!

On the other hand, all of this "multi factor authentication" is totally inappropriate. They're supposed to be looking after my health, not my money! In an emergency, my friends might need fast access to my health records!

Doctor Syntax

I think this was a subsequent onea although possibly another head on the original hydra.

Anonymous Coward

From my experience of working in IT for the NHS I would say 95% of clinicians don't give a hoot about security. They just want the computers/systems to work. Also, I have said for a long time that if the politicians are serious about the NHS surviving they all need to sit down, with people that actually know what they are talking about, agree a ten and twenty year plan and stick to it, regardless of which faction of half wits are 'in power' I know the chances of that happening are slim to negligible but we can all dream.

Doctor Syntax

"95% of clinicians don't give a hoot about security. They just want the computers/systems to work."

Security is a long term requirement of just working. It needs to be well thought out and implemented to stop it being a short term anti-pattern.

Recent example: I receive an email from a local hospital trust about an out-patient appointment. This includes a link to an external provider and an access code to download a PDF of the appointment letter. About the only difference between the security of just attaching the letter was that the 3rd party provider's site asked for my DoB but that's hardly a top secret anyway - after all the trust had provided it to the 3rd party to check. Just another security theatre anti-pattern adding a minimal amount of security and the added attack surface of a 3rd party.

payday

simkin

Yeah but that third party gets paid (from yet more of your tax dollars), so it's working as intended.

Procured kit needs regulating too.

Anonymous Coward

Anonymous for obvious reasons.

I know of kit that still runs on xp over the lab networks. With nothing more than a hard to guess name for the SMB share for security. The vendor has recently moved to Win 7 for their new kit, but the same issues persist.

Toughen up the procurement policy to make sure that this cannot be allowed, make vendors HAVE to keep the kit OS updated for a minimum number of years. As well as make the board and dept heads responsible for not following security best practice and this would a good chunk of ancient insecure kit rapidly.

Re: Procured kit needs regulating too.

Doctor Syntax

It's a cleft stick. What if one of the "security updates" introduces a loss of some functionality on which the application depends - or an outright BSoD? Is a big general purpose OS the best solution to running the S/W side of an instrument?

Re: Procured kit needs regulating too.

simkin

It probably is, because otherwise you have yet more hardware to maintain. And everyone can run Windows.

"Board member"...?

Vometia has insomnia. Again.

You're unlikely to see any senior managers in the actual hospital. They have their own gated communities on sites well away from smelly patients.

Good times

Anonymous Coward

...says a lot that healthcare insiders actually miss the COVID-19 pandemic, because during that time they say the NHS was, for the first time in their careers, agile enough to allow improvements to be made without the usual onerous approval stages.

Apart from the .... well everything that happened ... absolutely this. There was a period of time at the start of the pandemic where the blob lost control and it was beautiful. Didn't last long.

Re: Good times

Anonymous Coward

"There was a period of time at the start of the pandemic where the blob lost control and it was beautiful. Didn't last long."

No, because the blob, or more specifically Matt-the-**** Hancock kicked off the process of trying to dismantle and degrade NHS England, because (when not stuffing his mistress in the office) he had a tantrum that he was not allowed to overrule the professionals on technical matters. That effort to rip up NHSE has been continuing since then, and is making things worse on a lot of fronts.

Re: Good times

Vometia has insomnia. Again.

I thought it was his predecessor; someone so dull I forget his name offhand, but the one who introduced and enforced this absurd internal market malarkey that broke everything. Not that I'm trying to defend Wanksock, in fact I feel a bit dirty diluting any of his well-deserved ire.

Not the UK NHS

CyberResilience

I'm not saying this isn't the same in Wales, Scotland and Northern Ireland but I think the article is talking about England (overseen by NHS England). Health is a devolved matter for the rest of the UK. And digital services are managed 'once' I believe. Rather than permitting each organisation to do what the Director of IT thinks is best.

A very well positioned article though. Would also reference the challenges of safely and securely attempting to integrate different systems (new and legacy) into single patient administration systems. The general disconnect between systems in different organisations and geographies that is attempting to be tamed through big procurement (££££) and the lack of basic meaningful training for new and existing staff (not just e-learning to tick a box).

I use technology in order to hate it more properly.
-- Nam June Paik