We have detected that you are using Internet Explorer to visit this website. Internet Explorer is now being phased out by Microsoft. As a result, NHS Digital no longer supports any version of Internet Explorer for our web-based products, as it involves considerable extra effort and expense, which cannot be justified from public funds. Some features on this site will not work. You should use a modern browser such as Edge, Chrome, Firefox, or Safari. If you have difficulty installing or accessing a different browser, contact your IT support team.
14 May 2017: Our Data Security Centre continues to work around the clock alongside the National Cyber Security Centre, to support NHS organisations that have reported any issues related to this cyber-attack.
In addition to providing 24/7 specialist support, we have issued a number of targeted bulletins to further support, guide and reassure NHS staff with cyber-security responsibilities in their organisations.
NHS Digital is continuing to expand the range of data security services it offers in support of NHS organisations; helping them to take appropriate cyber security measures and respond effectively and safely to cyber security threats.
We continue to alert NHS organisations to known cyber security threats and advise them of appropriate steps to take to minimise these risks, such as in the case of this issue.
In addition to protective real time monitoring of national NHS IT services and systems, which were unaffected by this issue, we are supporting NHS organisations by:
- undertaking cyber security testing and providing bespoke advice and action points
- offering training for their health and care staff to ensure they know the simple steps to help to keep their organisation secure
It is important to note that the vast majority of NHS organisations report that they are running contemporary IT systems, which are commissioned depending on local need.
However it is true to say that a very small percentage of organisations are still in the process of upgrading all of their devices from older operating systems; but where this is the case there are simple steps that can be taken to protect against cyber threat.