{"id":847,"date":"2017-05-17T16:03:37","date_gmt":"2017-05-17T15:03:37","guid":{"rendered":"http:\/\/blogs.reading.ac.uk\/the-forum\/?p=847"},"modified":"2023-02-23T15:41:18","modified_gmt":"2023-02-23T15:41:18","slug":"nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems","status":"publish","type":"post","link":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/","title":{"rendered":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems"},"content":{"rendered":"<p><strong>By <a href=\"https:\/\/www.henley.ac.uk\/people\/weizi-li\">Weizi Vicky Li<\/a>, Informatics Research Centre, Henley Business School<\/strong><\/p>\n<p>With healthcare service scopes expanding, healthcare processes changing and technologies evolving over time, many systems need improvement or they become vulnerable to cyber-attacks. This is especially true in hospitals, where most legacy systems provide critical\u00a0 information and essential support for business operations with a lot of sensitive data.<\/p>\n<p>Information systems and intranet\/internet have been implemented in NHS hospitals for more than 30 years. Early systems implemented in the NHS include Patient Administration System, GP systems, Pathology laboratory systems, radiology and PACS systems, nursing and care planning systems, theatre systems etc.<\/p>\n<p>The threats lie in the fact that many of the legacy systems have long been integrated into the core business and healthcare service processes, and therefore cannot be simply scrapped. In short, those legacy systems are valuable as well as vulnerable.<\/p>\n<p><!--more--><\/p>\n<p>The attack should clearly prompt a rethink about the future use of information systems in large organisations such as NHS, especially with the increasing reliance on big data analytics and artificial intelligence in the future. Therefore, apart from routine software maintenance such as keeping IT systems up-to-date and improving staff cyber security awareness, actions should also involve coarser-grained, higher level and system structural changes (re-architect) which can be realised through a combination of renovation activities from both bottom-up and top-down.<\/p>\n<p>While the former approach reconstructs the system design by analysing the source code (e.g. software patch), the top-down methods examine the cyber security of legacy systems within an operating context. A modularised system architecture design that further &#8216;encapsulates&#8217; legacy systems could be a way of\u00a0modernising and protecting NHS systems, as well as preserving the original system investment and retaining the ability to scale up in the future.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Weizi Vicky Li, Informatics Research Centre, Henley Business School With healthcare service scopes expanding, healthcare processes changing and technologies evolving over time, many systems need improvement or they become&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#98;&#108;&#111;&#103;&#47;&#50;&#48;&#49;&#55;&#47;&#48;&#53;&#47;&#49;&#55;&#47;&#110;&#104;&#115;&#45;&#99;&#121;&#98;&#101;&#114;&#45;&#97;&#116;&#116;&#97;&#99;&#107;&#45;&#99;&#104;&#97;&#110;&#103;&#101;&#45;&#110;&#101;&#101;&#100;&#101;&#100;&#45;&#116;&#111;&#45;&#112;&#114;&#111;&#116;&#101;&#99;&#116;&#45;&#118;&#97;&#108;&#117;&#97;&#98;&#108;&#101;&#45;&#121;&#101;&#116;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#108;&#101;&#45;&#104;&#111;&#115;&#112;&#105;&#116;&#97;&#108;&#45;&#105;&#116;&#45;&#115;&#121;&#115;&#116;&#101;&#109;&#115;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"categories":[25],"tags":[434,475,624,810],"class_list":["post-847","post","type-post","status-publish","format-standard","hentry","category-prosperity-resilience","tag-henley-business-school","tag-informatics-research-centre","tag-nhs","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research\" \/>\n<meta property=\"og:description\" content=\"By Weizi Vicky Li, Informatics Research Centre, Henley Business School With healthcare service scopes expanding, healthcare processes changing and technologies evolving over time, many systems need improvement or they become...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Connecting Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/theuniversityofreading\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-17T15:03:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-23T15:41:18+00:00\" \/>\n<meta name=\"author\" content=\"Martin Watts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UniRdg_Research\" \/>\n<meta name=\"twitter:site\" content=\"@UniRdg_Research\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin Watts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\"},\"author\":{\"name\":\"Martin Watts\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/7db63d5a455bb6b8a1655df56c4e6b0f\"},\"headline\":\"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems\",\"datePublished\":\"2017-05-17T15:03:37+00:00\",\"dateModified\":\"2023-02-23T15:41:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\"},\"wordCount\":305,\"publisher\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#organization\"},\"keywords\":[\"henley business school\",\"Informatics Research Centre\",\"NHS\",\"security\"],\"articleSection\":[\"Prosperity &amp; Resilience\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\",\"name\":\"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#website\"},\"datePublished\":\"2017-05-17T15:03:37+00:00\",\"dateModified\":\"2023-02-23T15:41:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-blog\/\",\"name\":\"Connecting Research\",\"description\":\"Research stories from across the University of Reading\",\"publisher\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#organization\",\"name\":\"University of Reading\",\"alternateName\":\"UoR\",\"url\":\"https:\/\/research.reading.ac.uk\/research-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-blog\/wp-content\/uploads\/sites\/72\/2022\/10\/University-of-Reading-Logo-1.png\",\"contentUrl\":\"https:\/\/research.reading.ac.uk\/research-blog\/wp-content\/uploads\/sites\/72\/2022\/10\/University-of-Reading-Logo-1.png\",\"width\":440,\"height\":147,\"caption\":\"University of Reading\"},\"image\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/theuniversityofreading\/\",\"https:\/\/twitter.com\/UniRdg_Research\",\"https:\/\/www.linkedin.com\/school\/university-of-reading\/mycompany\/verification\/\",\"https:\/\/www.youtube.com\/channel\/UCsFUmxmcVbVJ-9iGczsKfuw\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Reading\",\"https:\/\/www.instagram.com\/uniofreading\/?hl=en\",\"https:\/\/www.tiktok.com\/@uniofreading\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/7db63d5a455bb6b8a1655df56c4e6b0f\",\"name\":\"Martin Watts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0e4330928a8450302f76e687aae444cc8cad1acaf78e26aec4a710f6a48b390?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0e4330928a8450302f76e687aae444cc8cad1acaf78e26aec4a710f6a48b390?s=96&d=mm&r=g\",\"caption\":\"Martin Watts\"},\"url\":\"https:\/\/research.reading.ac.uk\/research-blog\/author\/m-r-wattsreading-ac-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/","og_locale":"en_GB","og_type":"article","og_title":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research","og_description":"By Weizi Vicky Li, Informatics Research Centre, Henley Business School With healthcare service scopes expanding, healthcare processes changing and technologies evolving over time, many systems need improvement or they become...Read More >","og_url":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/","og_site_name":"Connecting Research","article_publisher":"https:\/\/www.facebook.com\/theuniversityofreading\/","article_published_time":"2017-05-17T15:03:37+00:00","article_modified_time":"2023-02-23T15:41:18+00:00","author":"Martin Watts","twitter_card":"summary_large_image","twitter_creator":"@UniRdg_Research","twitter_site":"@UniRdg_Research","twitter_misc":{"Written by":"Martin Watts","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#article","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/"},"author":{"name":"Martin Watts","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/7db63d5a455bb6b8a1655df56c4e6b0f"},"headline":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems","datePublished":"2017-05-17T15:03:37+00:00","dateModified":"2023-02-23T15:41:18+00:00","mainEntityOfPage":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/"},"wordCount":305,"publisher":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/#organization"},"keywords":["henley business school","Informatics Research Centre","NHS","security"],"articleSection":["Prosperity &amp; Resilience"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/","url":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/","name":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems - Connecting Research","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/#website"},"datePublished":"2017-05-17T15:03:37+00:00","dateModified":"2023-02-23T15:41:18+00:00","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-blog\/2017\/05\/17\/nhs-cyber-attack-change-needed-to-protect-valuable-yet-vulnerable-hospital-it-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-blog\/"},{"@type":"ListItem","position":2,"name":"NHS cyber attack: Change needed to protect valuable yet vulnerable hospital IT systems"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#website","url":"https:\/\/research.reading.ac.uk\/research-blog\/","name":"Connecting Research","description":"Research stories from across the University of Reading","publisher":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#organization","name":"University of Reading","alternateName":"UoR","url":"https:\/\/research.reading.ac.uk\/research-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/logo\/image\/","url":"https:\/\/research.reading.ac.uk\/research-blog\/wp-content\/uploads\/sites\/72\/2022\/10\/University-of-Reading-Logo-1.png","contentUrl":"https:\/\/research.reading.ac.uk\/research-blog\/wp-content\/uploads\/sites\/72\/2022\/10\/University-of-Reading-Logo-1.png","width":440,"height":147,"caption":"University of Reading"},"image":{"@id":"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/theuniversityofreading\/","https:\/\/twitter.com\/UniRdg_Research","https:\/\/www.linkedin.com\/school\/university-of-reading\/mycompany\/verification\/","https:\/\/www.youtube.com\/channel\/UCsFUmxmcVbVJ-9iGczsKfuw","https:\/\/en.wikipedia.org\/wiki\/University_of_Reading","https:\/\/www.instagram.com\/uniofreading\/?hl=en","https:\/\/www.tiktok.com\/@uniofreading"]},{"@type":"Person","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/7db63d5a455bb6b8a1655df56c4e6b0f","name":"Martin Watts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0e4330928a8450302f76e687aae444cc8cad1acaf78e26aec4a710f6a48b390?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0e4330928a8450302f76e687aae444cc8cad1acaf78e26aec4a710f6a48b390?s=96&d=mm&r=g","caption":"Martin Watts"},"url":"https:\/\/research.reading.ac.uk\/research-blog\/author\/m-r-wattsreading-ac-uk\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/posts\/847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/comments?post=847"}],"version-history":[{"count":1,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/posts\/847\/revisions"}],"predecessor-version":[{"id":26858,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/posts\/847\/revisions\/26858"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/media?parent=847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/categories?post=847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-blog\/wp-json\/wp\/v2\/tags?post=847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}