The 12 Insecure Days of Christmas
- 22 December 2016
It's that time of year when things get merry for most people, but not those of us involved with cyber security.
In fact, the festive period from Black Friday onwards is something of a magnet for phishers and scammers looking to get people to part with their cash.
Why should this bother public service organisations, such as those in the NHS? Here's the thing: cyber criminals trade data such as compromised logins amongst themselves.
A compromised personal email can often yield a bountiful harvest of information that can be used in a spear phishing attack that targets that individual.
If that wasn't reason enough to be worried, then there's the not so small problem of password sharing between personal and organisational accounts.
It should come as no surprise that data stolen before Christmas is often core to the compromises that come after it. Anyway, enough of the bah, humbug stuff.
I've consumed more than my fair share of the office sherry and have composed this 'white hat' version of the 12 days of Xmas, featuring a selection box of the stories and features that have gone on the Digital Health Cyber Security hub this year.
I hope it serves as a timely warning of just some of the risks we face out there. See you on the other, more secure, side…
On the First day of Christmas my true love sent to me
A new hub about cyber security
On the Second day of Christmas my true love sent to me
Two Globe ransomware
And a new hub about cyber security
On the Third day of Christmas my true love sent to me
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Fourth day of Christmas my true love sent to me
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Fifth day of Christmas my true love sent to me
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Sixth day of Christmas my true love sent to me
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Seventh day of Christmas my true love sent to me
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Eighth day of Christmas my true love sent to me
Eight year old drug pumps
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Ninth day of Christmas my true love sent to me
Nine out of ten docs using apps
Eight year old drug pumps
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Tenth day of Christmas my true love sent to me
Ten doctors sharing six computers
Nine out of ten docs using apps
Eight year old drug pumps
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Eleventh day of Christmas my true love sent to me
£11 million investment in Welsh NHS security
Ten doctors sharing six computers
Nine out of ten docs using apps
Eight year old drug pumps
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
On the Twelfth day of Christmas my true love sent to me
Twelve steps to prepare for GDPR
£11 million investment in Welsh NHS security
Ten doctors sharing six computers
Nine out of ten docs using apps
Eight year old drug pumps
Seven trusts spending ZERO on cyber security
Six XP virus mutations
The Internet of Things
Four Fancy Bears
Three Caldicott Reports
Two Globe ransomware
And a new hub about cyber security
About the author: Davey Winder is a three time Information Security Journalist of the Year award winner, and regularly contributes to The Times as well as being Managing Analyst at IT Security Thing. Follow him @happygeek.