Last summer, NHS Digital announced the NHS Secure Boundary, which aims to strengthen cyber resilience across health and care. Alfie Harvey, strategic delivery lead at NHS Digitals Data Security Centre, talks about how the project is going.
NHS Digitals plan to provide world-class next generation firewalls to help protect the increasing digital perimeter of the NHS has reached a significant milestone, York Teaching Hospitals NHS Foundation Trust is the first organisation to be fully integrated into NHS Secure Boundary and will lead the way for other organisations to get on board.
Last summer, we announced the delivery of NHS Secure Boundary and our partnership with Accenture, and we now hope that more NHS organisations will take up this centrally funded service, which will enable us to strengthen cyber resilience across health and care.
Over the past four months, we have been working with organisations across the NHS to develop NHS Secure Boundary as a pilot. This has involved gathering their vital feedback so we can learn the best way to extend this solution across the wider NHS.
One of the key things to come out of the feedback is a clear message that organisations need us to vary our approach to onboarding onto the solution. This allows us to walk them through each step of the process, providing support with a dedicated set of expert resources, tailored to their needs.
Organisations can manage how they go through the onboarding process. If local IT teams want to be more hands on in how they manage their set up, then that is fine and we will take a step back, offering support if and when they need it. We have produced an onboarding manual which details every step from inception through to implementation
So why Secure Boundary?
NHS Secure Boundary is a powerful cyber security tool that gives NHS organisations the chance to control what passes in and out of their digital estate. IT teams can benefit from secure filtering for web content, next generation firewalls, secure DNS services and data loss prevention, among other things.
It also gives us a chance to see a broader picture centrally of what is happening with internet traffic. The more we can see across the NHS system, the better we can scan for potential threats in real time, detecting and neutralising them to help NHS organisations to protect themselves.
The NHS Secure Boundary also supports essential programs, such as HSCN and Internet First, by helping to modernise security for organisations access to the internet. This will give front-line clinicians across organisations the ability to access more timely information and therefore make more informed decisions on patient care.
There are the longer-term strategic objectives to keep in mind, as well. NHS Secure Boundary supports both the NHS Long Term Plan and the Secretary of States Tech Vision. It does this by providing additional protection for accessing the internet, leveraging the cloud, and taking advantage of innovative technologies and services which, in turn, will deliver greater operational efficiencies and better clinical outcomes.
Over the last couple of years, we have been analysing, identifying, neutralising and responding to cyber security risks in the NHS, using data from the Data Security and Protection Toolkit, our on-site cyber assessments, our Security Operations Centre and our Cyber Security Support Model.
Organisations without specialist cyber security expertise will benefit hugely from the central support delivered by NHS Secure Boundary. NHS Digital and our supporting partners, Accenture, Imperva and Palo Alto Networks, can provide a helping hand, supporting organisations to manage their firewalls and protect internet traffic, though the option is still there to locally manage firewalls.
It also protects HSCN or National Gateway connections as well as local internet breakouts, to a national standard. Internet-facing applications, like appointment booking systems, are often vulnerable to a range of potential threats like Distributed Denial of Service (DDOS) attacks. The NHS Secure Boundary not only protects these systems, but the patients using them as well.
The more NHS organisations that sign up to NHS Secure Boundary, the better for the whole system as it will build an even stronger network to fight against cyber threats and manage attempts to infiltrate the system.
Working with Accenture, Imperva and Palo Alto Networks, we will be focussed on supporting NHS organisations and central network service providers to get them onboard over the next two years with managed support from our partners over the next five years.
There is a centrally funded two-year programme to onboard organisations with a dedicated team on hand to manage and support them, which started in January 2020.
NHS Secure Boundary complements and supports the other services provided by NHS Digitals Data Security Centre to help mitigate the risks we identified in our analysis of the wider system. These include Microsoft Advanced Threat Protection, our email filtering service, the Cyber Security Support Model, our workforce simulated phishing campaigns and our board level-training, providing both physical protection from threats and better awareness of cyber issues for staff.
Feedback from our early adopter
Shane Martin, Network Manager at York Teaching Hospital NHS Foundation Trust said: NHS Secure Boundary has given us an extra layer of security for our internet access at almost zero cost for our trust, saving potentially hundreds of thousands on a similar product if wed had to buy it in ourselves.
Its next-generation firewall, which identifies potential threats early on and reduces our risk of exposure to hackers, was really appealing to us and the fact that NHS Secure Boundary helps to fulfil the Cyber Essentials+ and Data Security and Protection Toolkit requirements was also a big bonus.
Well be using NHS Secure Boundarys Web Application Firewall, which will protect all of our external-facing web services from potentially malicious inbound access requests.
This means that we will be able to host our patient administration systems on our own network, and both community workers and sanctioned external organisations will be able to securely access them from wherever they are. So, this will enable a much more mobile and connected workforce, allowing clinical information to be available securely at the point of care, be that on our premises or at a patients home.
So, NHS Secure Boundary will not only save the trust money, it will ensure that the best possible protection surrounds our most critical systems and allow us to provide an even better level of care to our patients.
We want more organisations to start sharing in the benefits of NHS Secure Boundary, to help better protect themselves and each other. To find out more about the potential benefits that NHS Secure Boundary can give your organisation and sign up, contact the mailbox firstname.lastname@example.org
- Security of online voting questioned | News, Sports, Jobs - The Daily Times - February 16th, 2020
- This may be the last piece I write: prominent Xi critic has internet cut after house arrest - The Guardian - February 16th, 2020
- An Alternative to Windows 7 - Budapest Business Journal - February 16th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The Indian Express - February 16th, 2020
- Microsoft Patch Tuesday fixes IE zeroday and 98 other flaws - We Live Security - February 16th, 2020
- 'More guidance and regulation': Zuckerberg requests government rules on 'what discourse should be allowed' - Washington Examiner - February 16th, 2020
- Internet of Things (IoT) Security Product Market: Development Factors and Investment Analysis by Leading Manufacturers 2018 2026 - TechNews.mobi - February 16th, 2020
- Our personal health history is too valuable to be harvested by the tech giants - The Guardian - February 16th, 2020
- Cyber Security Today The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more - IT World Canada - February 15th, 2020
- Indias proposed internet regulations can threaten privacy everywhere - The News International - February 15th, 2020
- Antivirus Is Not Enough in 2020: Here is Why - laprogressive.com - February 15th, 2020
- FBI: Cybercrime losses tripled over the last 5 years - We Live Security - February 15th, 2020
- AIoT Convergence of Artificial Intelligence with the Internet of Things - EnterpriseTalk - February 15th, 2020
- Indias proposed internet regulations could threaten privacy everywhere - The Verge - February 15th, 2020
- Global Internet of Things (IoT) Security Market Key Players, Share, Trend, Segmentation and Forecast to 2026: Cisco Systems, Intel Corporation, IBM... - February 15th, 2020
- Romance scammers stole $475m last year. Here's how to spot them - Verdict - February 15th, 2020
- Safer Internet Day 2020 Together for a better internet - Security Boulevard - February 14th, 2020
- Internet's safe-keepers forced to postpone crucial DNSSEC root key signing ceremony no, not a hacker attack, but because they can't open a safe - The... - February 14th, 2020
- Here's how to avoid becoming a victim of a tax scam - AZ Big Media - February 14th, 2020
- Will Weak Passwords Doom the Internet of Things (IoT)? - Security Intelligence - February 14th, 2020
- Bithumb Employee Found Guilty of Security Failings that Led to Hack - Cryptonews - February 14th, 2020
- Will your vote count? Ohio working to increase election security - WHIO - February 14th, 2020
- Perimeter 81 Introduces SASE Platform This latest offer is based on a partnership with investor and - Channel Futures - February 14th, 2020
- Global Internet of Things (IoT) Security Market Segmentation along with Regional Outlook, Competitive Strategies, Factors Contributing to Growth and... - February 14th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The New York Times - February 14th, 2020
- TechForce Aberdeen event to kick off Cyber Scotland Week - The Scotsman - February 14th, 2020
- Security Strategy: Moving Away From Tried and True - Security Boulevard - February 5th, 2020
- Internet Security Software Market investigated in the latest research - WhaTech Technology and Markets News - February 5th, 2020
- What Is Log Management, and Why Is It Important? - Security Boulevard - February 5th, 2020
- Latest Released 2020 Version Of Internet Security Market With Market Data Tables, Graphs, Figures and Pie Chat - TheLoop21 - February 5th, 2020
- Booter Boss Busted By Bacon Pizza Buy - Krebs on Security - February 5th, 2020
- Yet another Windows 10 fail as new update breaks the internet - heres how to fix it - TechRadar India - February 5th, 2020
- 'Formjacking' Is the New Internet Scam We Need to Watch Out For - q985online.com - February 5th, 2020
- Kiwis think benefits of the internet outweigh the negatives - SecurityBrief New Zealand - February 5th, 2020
- GAO: DHS and Agencies Must Work to Improve Cybersecurity - HSToday - February 5th, 2020
- Government to strengthen security of internet-connected products - GOV.UK - January 31st, 2020
- DigiCert Leads Initiative to Enhance EV SSL Certificates - Security Boulevard - January 31st, 2020
- eScan Internet Security Suite - Download - January 30th, 2020
- Internet Security - January 30th, 2020
- Best malware removal software of 2020: free and paid anti-malware tools and services - TechRadar - January 30th, 2020
- Government to strengthen security of internet-connected products - SecurityNewsDesk - January 30th, 2020
- IoT security: Your smart devices must have these three features to be secure - ZDNet - January 30th, 2020
- Millions of Wawa customers data breached selling on dark web - wobm.com - January 30th, 2020
- DigiCert CEO: Focus Security and Privacy on the Person - Infosecurity Magazine - January 30th, 2020
- CounterAct Cybersecurity Group Launches End-to-End Approach to Help MSPs Protect Their Businesses and Customers from Information Security Threats -... - January 30th, 2020
- The US Space Force Has a Rough Launch on the Internet - WIRED - January 30th, 2020
- Startup MGZN The only Arab company on eSecurity Planet's Top 18 Cybersecurity Startups 2020 is this one! - Startup MGZN - January 30th, 2020
- Bitdefender wants to protect your device for just over 7 dollars, but there's a catch - TechRadar - January 26th, 2020
- How scammers take advantage of stressed-out taxpayers - The Guardian - January 26th, 2020
- Here's the Top Cyber-Security Software You Need To Consider Downloading For 2020 - Grit Daily - January 26th, 2020
- Limited internet to be restored in Kashmir, no access to social media - Reuters - January 26th, 2020
- Analyzing AppFolio (NASDAQ:APPF) and Cyren (NASDAQ:CYRN) - Riverton Roll - January 26th, 2020
- The Rise of the Internet of Things | 2020-01-20 - Security Magazine - January 25th, 2020
- Protecting Websites from Magecart and Other In-Browser Threats - Security Boulevard - January 25th, 2020
- Off-campus wireless internet security on par with University - Kent Wired - January 25th, 2020
- Jeff Bezos Phone Hack Should Terrify Everyone - The New York Times - January 25th, 2020
- Limited internet to be restored in Kashmir, no access to social media - WSAU News - January 25th, 2020
- Cyber Security Today Kids clothes site hacked, a new phony email extortion scam and be careful with Internet Explorer - IT World Canada - January 25th, 2020
- Experts write to government on cyber fixes - Economic Times - January 25th, 2020
- Internet Security Software Market by Types, Applications, Countries and Forecasts to 2026 - Vital News 24 - January 24th, 2020
- An Open Source Effort to Encrypt the Internet of Things - WIRED - January 24th, 2020
- Local News Role of the internet in human trafficking to be highlighted at summit in SLO - KSBY San Luis Obispo News - January 24th, 2020
- Global Internet of Things (IoT) Security Market | By Component,By Type,By Application Area Dagoretti News - Dagoretti News - January 24th, 2020
- Internet Security Market to Reap Excessive Revenues by 2026 Dagoretti News - Dagoretti News - January 19th, 2020
- How to Secure Your Windows 7 PC in 2020 - How-To Geek - January 19th, 2020
- Security fears saw nearly half of Europe use the internet less during 2018 - The Brussels Times - January 19th, 2020
- Senate Passes Legislation to Help Boost and Secure the Internet of Things - Nextgov - January 19th, 2020
- Internet of Things presents the next frontier of cyberattacks - ITProPortal - January 19th, 2020
- Ooma Improves on Phone and Home Security with New Products for Cord Cutters - Cord Cutters News, LLC - January 19th, 2020
- Windows 7 computers will no longer be patched after today - Naked Security - January 19th, 2020
- How the Trump administration is secretly assisting Iranian protesters - Washington Examiner - January 19th, 2020
- Iowa results will be compiled over the internet, hacking threat aside - The Fulcrum - January 19th, 2020
- Interview with Jordan Blake on the potential of behavioural biometrics - The Paypers - January 19th, 2020
- Cyren (NASDAQ:CYRN) Stock Rating Lowered by Zacks Investment Research - Riverton Roll - January 19th, 2020
- Password Managers: What Are They & How to Use Them? - TechAcute - January 19th, 2020
- EZVIZ C6CN pan-and-tilt security camera review: Motion tracking keeps intruder in this camera's sights - TechHive - January 19th, 2020
- New Year, new gadgets? Five ways to keep your new devices safe from hackers, cyber attacks and malware - ZDNet - January 6th, 2020
- BlackBerry Collaborating with Amazon Web Services to Demonstrate Safe, Secure, and Intelligent Connected Vehicle Software Platform for In-Vehicle... - January 6th, 2020
- Internet of Things security firm Armis in talks to be acquired -media - Nasdaq - January 6th, 2020
- The Internet of Things: how safe are your smart devices? - Spectator.co.uk - January 6th, 2020