Eskenzi PR Eskenzi PR
  • About Us
Wednesday, 21 April, 2021
IT Security Guru
Eskenzi PR
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

NHS cyber-attack patch highlights complexity of keeping enterprise IT up to date

by The Gurus
May 16, 2017
in Editor's News
Threat Detection
Share on FacebookShare on Twitter

A patch which may have prevented the NHS ransomware attack was made available to the organisation a month ago, it has emerged.[1] The widespread use of unsupported Windows XP operating systems is thought to have provided an entry-point for hackers to infect computers with ransomware software, effectively paralysing large parts of the NHS.
The attack brings into relief the scale of vulnerabilities which can develop as systems are not kept up to date. World Wide Technology, a global systems integrator, warns that the growing complexity of managing enterprise-level IT will increase the regularity with which software must be patched, even as this attack shows that existing patches are not always being adopted.
Ben Boswell, UK & Ireland Director at World Wide Technology, has advised that the relationship between software providers and organisations should increasingly be governed by a new breed of Enterprise License Agreements (ELAs). These are now being tailored towards fast-moving areas of technology such as security, replacing the product-by-product purchasing model which can so quickly leave companies lagging behind.
Ben highlights that the ELA purchasing model, increasingly now future proofed with updates, allows organisations to guarantee software support and therefore greater resilience in the face of growing cyber threats.
Ben commented: “The attack that has been developing over the weekend has highlighted the fact that IT should be at the forefront of operations planning in any large organisation such as the NHS. But the product-by-product approach, where large-scale IT infrastructure is bought on an ad-hoc basis and fully updated sometimes as infrequently as once every decade, leaves organisations incredibly vulnerable to attack.”
He continued: “By continuing to use software that is unsupported by the manufacturer, organisations effectively put a target on their back for malicious hackers. One way of navigating this is to engage in an Enterprise License Agreement (ELA), a contract between customer and supplier which means that both hardware and software are fully supported on a rolling basis.”
“In recent years we have seen how the ELA has evolved in order to better accommodate the changing needs of growing businesses who are increasingly looking for flexibility. Many ELAs now include security, network and other hardware support in the same package as well as being available on a pay-by-usage policy – meaning that firms can accelerate innovation into their IT systems through just one agreement.”

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: attackCyberRansomwaresecurityTechnology
ShareTweetShare
Previous Post

Unfragmenting Security with Threat Intelligence

Next Post

SolarWinds MSP Security Survey Highlights Overconfidence, Lack of Preparedness by IT Execs to Fight Ransomware and Other Cyber Attacks

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

The clubhouse app

Armis and UK’s Eseye partner to secure connected devices on any cellular network

April 20, 2021
Performanta acquires Identity Experts to bolster Microsoft IAM and security capabilities

Performanta acquires Identity Experts to bolster Microsoft IAM and security capabilities

April 20, 2021
AT&T Cybersecurity Launches New Managed Endpoint Security Solution with SentinelOne

AT&T Cybersecurity Launches New Managed Endpoint Security Solution with SentinelOne

April 19, 2021
Dominos pizza

Domino’s India suffers data breach

April 19, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept