UK hospital meltdown after ransomware worm uses NSA vuln to raid IT

Docs use pen and paper after computers scrambled amid global outbreak

Source: UK hospital meltdown after ransomware worm uses NSA vuln to raid IT

<<UK hospitals have effectively shut down and are turning away non-emergency patients after ransomware ransacked its networks.

Some 16 NHS organizations across Blighty – including several hospital trusts such as NHS Mid-Essex CCG and East and North Hertfordshire – have had their files scrambled by a variant of the WannaCrypt, aka WanaCrypt aka Wcry, nasty. Users are told to cough up $300 in Bitcoin to restore their documents.

Doctors have been reduced to using pen and paper, and closing A&E to non-critical patients, amid the tech blackout. Ambulances have been redirected to other hospitals, and operations canceled.>>

A suitable Disaster Recovery applying field-proven MPO methods are called for in case your IT is struck by fallout from the NSA vulnerabilities and tool-collection that have been dumped by hackers in the open after not being rewarded by solvent buyers.

The missing OPSEC in the US cyber-activities have taken their toll, and we are well advised to protect our systems, with a good measure of security for disaster recovery. If you feel you could do with a suitable DR and incident response plan, and are a NHS entity, call

+44.1617 38 1243 

or ask us for a risk- and cost free telephone audit by one of our executive directors, followed by a workshop and PoC on-site on demand. Our DR/IR solution can save valuable time after rogue patches, ransomware or all kind of nasty cyber-infections.

 

90 per cent of the UK’s NHS is STILL relying on Windows XP

…. And a load of them say they’ll keep using it in 2017

Source: 90 per cent of the UK’s NHS is STILL relying on Windows XP • The Register

So, wouldn’t it be good to have a suitable solution to quickly switch to W10 (which seems to be the lesser evil) on NHS systems seamlessly and without issues? The Roth & Partners Managed Project Office can apply field proven methods to implement the iTAM (intelligent asset management solution plus active migration support) to audit, prepare, plan and transform NHS entities.

Cost is much less than one might think. The process cuts operational costs by 25-75%, according to studies in the public sector.

Call +44.1617 38 1243 for a quick audit with one of our executive partners free of charge. Ask us for a brochure.

Assetmanagement iTAM for license-management – new Whitepaper available

Our new whitepaper regarding iTAM, the operating-system independent IT-Asset-Management solution, based on R&P renowned managed project office methodology is available. The MPO allows customers to perform a quick asset management analysis, regardless of operating systems in the network, data center or on-premise of the organisation.

The underlying toolset allows much more than the iTAM asset-management. It is part of the suite that also does disaster recovery, patch- and release-management and backup- and restore automation. With the right dashboard, management can easily manage licensing issues and be informed about the state of things at any given moment in time, get warnings on license threshold limits reached and avoid under- or overlicensing issues, both a costly affair.

MPO and the underlying toolset can help customers to manage costs in IT infrastructure much better.

 

iTAM Flyer-ENG iTAM Flyer-DE

 

 

When do healthcare providers need CRM software development outsourcing?

Innovecs is ready to help healthcare providers with customized tech solutions. Outsource the development of your CRM solution to our experienced team:

Read more: When healthcare providers need CRM software development outsourcing

Some of you have already seen that we took up a new mandate beginning of this month. We are proud to mention our new partner Innovecs, an emerging R&D-house with incredible growth speed has entered into a collaboration agreement with R&P.

Especially in healthcare, reliability and dependability are key. The recent blog-post on healthcare CRM is a good read and shows a bit of background knowledge in Innovecs.

How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis

This is the thing BPM often ignores – to the chagrin of both customers and employees. In the algorithms of any given BPM-implementation, there is a need to be able to overrule the machine by individuals and these individuals need to be entitled and properly empowered to do so.

There are too many incidents in which an exception from the rule is called for but not catered for. Gregory Bufithis mentions this in his analysis of the case of the infamous UA airline incident:

Southwest Airlines and its “hub social team” that has spokes into every element of the business. Southwest actually has human decision making “escape valves” build into their algorithms used to dictate employee behavior. In other words, if an algorithmic process is going terribly wrong, it is ok for an employee to find a non-standard way to solve it or ask for help. Southwest has a “rapid response team” that can swoop in electronically (usually via a smart phone) to coach onsite employees on ways to response (and also authorizing extremely non-standard responses on the spot).

Source: How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis

Excellent reading matter, and a wake-up call for all of us doing BPM implementations to follow Southwests policies and not UAs.

Shadowbrokers show how equation group allegedly gained access to Pakistan GSM network

“From what I understand they have tools to collect CDRs (Call detail record) that are generated on GSM core networks for billing purpose (who is calling who, etc.),” x0rz said. “They are deep into these systems.”

There are more than 1,000 files included in the dump and it’s unknown whether any of the vulnerabilities being exploited remain unpatched.

Read on here

Security flaws in Pentagon systems “easily” exploited by hackers

Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago.

Source: Security flaws in Pentagon systems “easily” exploited by hackers | ZDNet

Not only for the Pentagon, it would be a great idea to install a suitable solution for Disaster Recovery (DR), just in case.