Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ZionSiphon Malware Targets Water Infrastructure Systems

April 20, 2026

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

April 20, 2026

Attackers Exploit DVR Command Injection Flaw to Deploy Botnet

April 20, 2026
Facebook X (Twitter) Instagram
Monday, April 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience
News

NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience

Team-CWDBy Team-CWDApril 20, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The UK’s National Cyber Security Centre (NCSC) has shared details of an ongoing coordinated plan to improve cyber resilience in the National Health Service (NHS).

Over the past 18 months, government and industry organizations have deepened their collaboration to reduce cyber risk and improve detection, the agency said in a blog post published on 17 April.

It pointed to several pillars underpinning this strategy:

  • Piloting new tools and services through the Active Cyber Defence (ACD) 2.0 program
  • Enhancing the security of the software supply chain
  • Managing vulnerability disclosures and sharing threat intelligence
  • Improving visibility to better understand the threat surface and deploy “defensive tradecraft”
  • Promoting NCSC tools and services including its Early Warning service, the Cyber Action Toolkit and the Cyber Essentials scheme

Read more on NHS security: NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers

Nicholas W. of the NCSC’s National Resilience Directorate explained how the government’s Software Security Code of Practice is already being used by the NHS in procurement to better understand the cyber maturity of suppliers.

The NCSC has also partnered with a healthcare organization, using data science tools to help it understand and prioritize supplier risk. There are plans to expand this initiative, by combining data such as incident history, alert and vulnerability activity from the NCSC Early Warning service with technical indicators including remediation patterns and exposed attack surfaces.

The NCSC highlighted how it has helped NHS England, the NHS Business Services Authority and NHS Scotland to establish internal vulnerability disclosure processes. This is in addition to its own Vulnerability Reporting Service (VRS), which has supported GP surgeries, NHS trusts, ambulance services, acute hospital trusts and health boards since 2019.

Other efforts include:

  • The NHS App was the first government-sponsored app to offer passkeys, and more organizations are set to follow suit
  • Continued work on External Attack Surface Management (EASM) and deception technology experiments across the sector
  • Use of analytics to identify and resolve DNS-related risks
  • NCSC Threat Hunting Workshops, which bring together cyber analysts from the sector to tackle real‑world threats, develop defensive playbooks, and strengthen relationships

Why Cyber Resilience Is Critical for the UK Healthcare Sector

The need for resilience building in the UK’s healthcare sector is much needed, given historic incidents.

The WannaCry campaign in 2017 cost the health service an estimated £92m ($118.6m), while a more recent ransomware attack on supplier Synnovis in 2024 led to the cancellation of 1500 operations and appointments and has been linked to the death of a patient.

The NHS was also rocked by a 2022 ransomware attack which struck IT partner Advanced Computer Software Group. That resulted in the theft of data on tens of thousands of individuals and major disruption to patient referrals, out-of-hours appointment bookings, emergency prescriptions and ambulance dispatches.

The key to the NCSC-driven plan for boosting resilience is collaboration across multiple industry and government stakeholders, said Nicholas W.

“Taken together, this work shows what is possible when organizations align around a shared goal. Effort is coordinated rather than duplicated, lessons are reused, and risk is reduced across the system, not just within individual organizations,” he concluded.

“Most importantly, this approach offers a model for other critical sectors. Cybersecurity challenges are too complex for any one organization to tackle alone.”

The UK’s National Cyber Security Centre (NCSC) has shared details of an ongoing coordinated plan to improve cyber resilience in the NHS.

Over the past 18 months, government and industry organizations have deepened their collaboration to reduce cyber risk and improve detection, the agency said in a blog post on Friday.

It pointed to several pillars underpinning this strategy:

  • Piloting new tools and services through the Active Cyber Defence (ACD) 2.0 program
  • Enhancing the security of the software supply chain
  • Managing vulnerability disclosures and sharing threat intelligence
  • Improving visibility to better understand the threat surface and deploy “defensive tradecraft”
  • Promoting NCSC tools and services including its Early Warning service, the Cyber Action Toolkit and the Cyber Essentials scheme

Read more on NHS security: NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers.

“Nicholas W” of the NCSC’s National Resilience Directorate explained how the government’s Software Security Code of Practice is already being used by the NHS in procurement to better understand the cyber maturity of suppliers.

The NCSC has also partnered with a healthcare organization, using data science tools to help it understand and prioritize supplier risk. There are plans to expand this initiative, by combining data such as incident history, alert and vulnerability activity from the NCSC Early Warning service with technical indicators including remediation patterns and exposed attack surfaces.

The NCSC highlighted how it has helped NHS England, the NHS Business Services Authority and NHS Scotland to establish internal vulnerability disclosure processes. This is in addition to its own Vulnerability Reporting Service (VRS), which has supported GP surgeries, NHS trusts, ambulance services, acute hospital trusts and health boards since 2019.

Other efforts include:

  • The NHS App was the first government-sponsored app to offer passkeys, and more organizations are set to follow suit
  • Continued work on External Attack Surface Management (EASM) and deception technology experiments across the sector
  • Use of analytics to identify and resolve DNS-related risks
  • NCSC Threat Hunting Workshops, which bring together cyber analysts from the sector to tackle real‑world threats, develop defensive playbooks, and strengthen relationships

NHS Under Fire

The need for resilience building in the UK’s healthcare sector is much needed, given historic incidents.

The WannaCry campaign in 2017 cost the health service an estimated £92m, while a more recent ransomware attack on supplier Synnovis in 2024 led to the cancellation of 1500 operations and appointments and has been linked to the death of a patient.

The NHS was also rocked by a 2022 ransomware attack which struck IT partner Advanced Computer Software Group. That resulted in the theft of data on tens of thousands of individuals and major disruption to patient referrals, out-of-hours appointment bookings, emergency prescriptions and ambulance dispatches.

The key to the NCSC-driven plan for boosting resilience is collaboration across multiple industry and government stakeholders, said Nicholas W.

“Taken together, this work shows what is possible when organizations align around a shared goal. Effort is coordinated rather than duplicated, lessons are reused, and risk is reduced across the system, not just within individual organizations,” he concluded.

“Most importantly, this approach offers a model for other critical sectors. Cybersecurity challenges are too complex for any one organization to tackle alone.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Next Article Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Team-CWD
  • Website

Related Posts

News

ZionSiphon Malware Targets Water Infrastructure Systems

April 20, 2026
News

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

April 20, 2026
News

Attackers Exploit DVR Command Injection Flaw to Deploy Botnet

April 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Is it OK to let your children post selfies online?

February 17, 2026

What’s at stake if your employees post too much online

December 1, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.