Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

NHS Tayside software fights off hundreds of hacking attempts per day

Post Thumbnail

Computers in NHS Tayside are being bombarded with up to 230 hacking attempts per day.

Data released through freedom of information legislation reveals security products throughout the health board deal with between 5,000 and 7,000 unauthorised attempts to break its IT system per month.

NHS Tayside was asked to divulge exactly how many attempts had been made per month for the last five years but could not give exact figures.

None of the attempts on the health board’s systems in that time were successful.

Computer expert James Morris, assistant director of IT at Dundee University, said it is not unusual for large companies and institutions to face such a barrage.

“There is a big difference between successful and unsuccessful attempts, of course,” he said.

“There are numerous types of actors, as we call them, who carry out IT attacks.

“The types of actors vary and they can be after financial gain, or organised crime, among others.

“There is also hobbyist and activist hackers, which are slightly different things.

“Whatever the motivation, many of these attacks take little skill to set up and once that is done their system can continually try to hack a system.

“Every internet accessible device can be attacked, so if you are talking about a big institution like Dundee University, or a council or a health board, that does equate to a large number of attempts.

“At the university, for example, there is a lot of personal information held so that can make for an attractive target. The biggest risk is people being duped into revealing their password.

“While there are a lot of safeguards in place, the reality is, that if China, for example, wanted to access our systems there is nothing we can really do to stop them.”

The Scottish Government introduced a cyber resilience action plan in recent years.

It outlines minimum requirements that public bodies in the country have to adhere to in regards to software security.

A NHS Tayside spokeswoman said: “Our protection systems have successfully repelled every attempted attack.

“The number of attacks may seem high, but every employee has access to our system and have an email address so it is a vast network. The numbers seen at NHS Tayside are not unlike those seen by any company or organisation of a similar size, is our understanding.

“Also, hacking is an all encompassing term. It includes phishing, malware attacks and many other methods. Many of these will be automated and not the stereotype of someone in their bedroom trying to access our systems.

“It is more sophisticated these days, but our safeguards are working.”