How NHS Leaders Strengthen Healthcare Cybersecurity Defenses
Post Summary
Cybersecurity in healthcare is no longer just a technical challenge - it’s a critical component of patient safety and operational efficiency. As healthcare systems become increasingly digitized, threats to sensitive data and critical systems have escalated in complexity and frequency. To address these challenges, experts like Martin Jarvis, Incident Management Lead at the NHS Cyber Security Operations Center, and Bob Child, Chief Commercial Officer at Soliton IT, share valuable insights into safeguarding healthcare organizations (HDOs) from cyber threats. This article unpacks those insights while offering actionable strategies to fortify cybersecurity in the healthcare sector.
The Growing Threat Landscape in Healthcare
One of the key themes emphasized by NHS leaders is that healthcare systems, including the NHS in England, are under constant attack. As Martin Jarvis highlighted, the NHS Cyber Security Operations Center alone responds to approximately 90 confirmed cybersecurity incidents each month, three of which are classified as serious due to their impact on patient care or business-critical systems. These attacks often stem from financially motivated cybercriminals targeting vulnerabilities in healthcare systems.
The stakes couldn’t be higher. A successful cyberattack on healthcare infrastructure could jeopardize clinical workflows, delay diagnoses, and even put lives at risk. For instance, ransomware attacks could grind essential services to a halt, leaving hospitals and clinics unable to access electronic medical records.
"The threat is ongoing, and attackers are looking for low-hanging fruit", Jarvis explained, likening cybercriminals to burglars seeking easy access points. This analogy underscores the critical need for robust defenses, particularly in an environment where patient safety is paramount.
sbb-itb-535baee
Coordinated Incident Response: How the NHS Is Preparing

The NHS Cyber Security Operations Center takes a structured, multi-pronged approach to managing cyber incidents. In cases of an attack, the team acts swiftly to assess the situation, assemble key stakeholders, and provide guidance to the affected organization. According to Jarvis, their goal is to "stop the attacker, contain the situation, and investigate the breach."
For large-scale attacks, NHS England brings additional resources to bear, including partnerships with law enforcement, the National Cyber Security Center (NCSC), and other agencies. This level of coordination ensures that both local incidents and national crises are managed effectively, minimizing disruption to patient care.
Bob Child emphasized the importance of collaboration, particularly for suppliers working with healthcare systems. "Rapid and accurate information sharing is key", Child said. He also stressed the need for proactive security measures, such as patching systems, implementing multi-factor authentication (MFA), and testing disaster recovery plans.
Cybersecurity in the Supply Chain: A Shared Responsibility
One of the pressing challenges for healthcare cybersecurity is managing third-party risks. Suppliers often play a critical role in providing IT services, medical devices, and imaging systems, making them a potential entry point for attackers. Alarmingly, 50% of reportable cybersecurity incidents under the NIS regulations since 2018 have involved supplier systems.
To address this, the NHS and industry partners have developed frameworks such as the NHS Cyber Security Supply Chain Charter. This voluntary charter outlines best practices for suppliers, including:
- Keeping systems up to date with patches.
- Implementing MFA.
- Ensuring robust backups and disaster recovery plans.
- Keeping board-level stakeholders informed about cybersecurity responsibilities.
By adhering to these principles, suppliers can act as trusted partners in safeguarding healthcare systems.
Awareness and Education: Building Resilience Across the Ecosystem
Public awareness and professional education remain pivotal in strengthening healthcare cybersecurity. While the NHS primarily focuses on engaging healthcare organizations and suppliers, they are making significant strides in knowledge-sharing through initiatives like:
- The Cyber Associates Network (CAN): A safe space for NHS organizations and suppliers to discuss ongoing threats, share best practices, and participate in webinars.
- High Severity Alerts: Notifications sent to organizations to address critical vulnerabilities with clear guidance on patching.
- Threat Intelligence Sharing Platform: A repository of up-to-date threat intelligence to help organizations make informed decisions.
- Cyber Sessions Podcast: Hosted by NHS experts, this podcast explores trends and challenges in cybersecurity.
Jarvis stressed that everyone in the healthcare ecosystem has a role to play. Whether it’s frontline staff reporting phishing attempts or IT teams ensuring proper configurations, collective effort is essential to mitigate risks.
Actionable Tips for Healthcare Organizations and Suppliers
Drawing from years of experience, Martin Jarvis offered practical advice to improve defenses against cyber threats:
- Strengthen Access Controls: Regularly review and limit accounts to the least privilege necessary. Remove unused accounts and enforce strong password policies.
- Implement MFA Correctly: Ensure multi-factor authentication is properly configured, as attackers often exploit misconfigurations.
- Prioritize Patching: Patch systems promptly, especially for vulnerabilities exposed to the internet.
- Regulate Software Deployment: Avoid using unauthorized software, particularly remote access tools, which can facilitate data exfiltration if compromised.
- Plan for Incidents: Develop and rehearse incident response plans to ensure preparedness. Time is critical during an attack, and clear protocols reduce stress and improve efficiency.
- Maintain Log Retention: Ensure key assets retain verbose logs for an adequate period to aid post-incident investigations.
Suppliers were also encouraged to collaborate with healthcare organizations during incident management planning. Familiarity with service-level agreements (SLAs) and mutual roles during crises can significantly enhance response effectiveness.
Key Takeaways
- Healthcare systems are under constant attack: NHS England manages approximately 90 cybersecurity incidents monthly, emphasizing the need for vigilance.
- Collaboration is critical: Suppliers and healthcare organizations must work together to mitigate risks, including through initiatives like the NHS Cyber Security Supply Chain Charter.
- Incident preparedness saves lives: Having a well-rehearsed incident response plan ensures swift action during cyber events.
- Key defenses include MFA, strong passwords, and timely patching: These measures address many of the vulnerabilities exploited by attackers.
- Awareness campaigns are vital: Initiatives like the Cyber Associates Network and threat intelligence sharing provide valuable resources to stakeholders.
- Supplier systems are a major vulnerability: A significant percentage of reportable incidents involve third-party systems, highlighting the importance of supplier compliance.
Conclusion
Healthcare organizations and their partners must recognize that cybersecurity is not just an IT issue - it’s a critical patient safety and operational concern. The insights shared by NHS leaders offer a roadmap for enhancing defenses, fostering collaboration, and preparing for inevitable cyber threats. By adopting robust security practices and emphasizing education and collaboration, the healthcare sector can build resilience against even the most sophisticated adversaries. Ultimately, safeguarding healthcare systems ensures the uninterrupted delivery of care to patients who depend on them every day.
Source: "S6 E4 Cybersecurity in Healthcare: Frontline Defences and Industry Responsibility" - AXREM insights, YouTube, Nov 27, 2025 - https://www.youtube.com/watch?v=uApaOKOxSZI
