Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    May 19, 2025

    NHS charter cybersecurity pledge

    The UK’s National Health Service (NHS) is asking its IT suppliers to commit to better cybersecurity by signing a public charter.

    In a May 15 open letter to suppliers, top UK and NHS cyber officials urged suppliers to sign the NHS charter and pledge to adopt cybersecurity best practices that could help address a wave of crippling ransomware attacks that have hit NHS hospitals and healthcare facilities.

    A self-assessment form will be launched in the fall allowing suppliers to sign the NHS charter. That gives them several months to adopt the eight practices outlined in the open letter.

    NHS Charter Outlines 8 Cybersecurity Practices

    The eight cybersecurity practices outlined in the letter include:

    • Keeping systems up to date with the latest patches for known vulnerabilities;
    • Achieving and maintaining at least “Standards Met” as part of the Data Security and Protection Toolkit (DSPT);
    • Applying Multi-Factor Authentication (MFA) to networks and systems and supporting identity federation or MFA functionality on products;
    • Deploying effective around-the-clock cyber monitoring and logging of critical IT infrastructure;
    • Implementing immutable backups of critical business data and products, with tested business continuity and rapid recovery plans;
    • Board-level exercises “to ensure you are confident of your ability to respond in the event of a cyber attack”;
    • Reporting to clients in a timely manner, adhering to all regulatory requirements, and working collaboratively with NHS England in the event of a cyberattack affecting patient care or data;
    • Producing any software for NHS in adherence to the Department for Science, Innovation and Technology (DSIT)/National Cyber Security Centre (NCSC) software code of practice and committing to meeting the principles of secure design and development, secure build environment, secure deployment and maintenance and communication with customers.

    NHS Pledge Is Voluntary – And Doesn’t Change Legal Requirements

    While the NHS charter pledge is voluntary, the letter notes that organizations “will also have legal obligations to maintain the cyber security of the processes and systems you operate under arrangements with NHS organisations.”

    That includes contractual terms and other obligations such as Article 32 of UK GDPR requirements for appropriate technical and organizational measures appropriate to the risks to personal data. And DSPT requirements “remain whether or not you sign-up to the cyber security charter.”

    The letter – from Phil Huggins, National Chief Information Security Officer for Health and Care at the Department of Health and Social Care; Mike Fell, NHS England Director of Cyber Operations; and Vin Diwakar, National Director of Transformation for NHS England – noted that additional steps are also under development that include:

    • Developing tools that providers can use to identify their critical suppliers to carry out appropriate assurance;
    • Defining requirements for a national supplier management platform to map the supply chain and develop a risk assurance model “allowing us to identify and mitigate concentration risk”;
    • And reviewing the contractual frameworks that NHS organizations use to enter contracts so they have appropriate security schedules and clear expectations, which is part of a cross-government initiative.

    The letter also referred to the planned Cyber Security and Resilience Bill that is under development and aimed at protecting critical infrastructure. The bill is expected to be introduced to Parliament later this year.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuild an AI-powered text-to-SQL chatbot using Amazon Bedrock, Amazon MemoryDB, and Amazon RDS
    Next Article More Than 100 Groups and Individuals Oppose GDPR Changes

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

    Security

    Anthropic Releases Claude Opus 4 and Claude Sonnet 4: A Technical Leap in Reasoning, Coding, and AI Agent Design

    Machine Learning

    CVE-2025-48114 – ShayanWeb Admin FontChanger CSRF Stored XSS

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-50370 – Phpgurukul Medical Card Generation System CSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-6059 – WordPress Seraphinite Accelerator CSRF

    June 14, 2025

    CVE ID : CVE-2025-6059

    Published : June 14, 2025, 3:15 a.m. | 2 hours, 23 minutes ago

    Description : The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the ‘OnAdminApi_CacheOpBegin’ function. This makes it possible for unauthenticated attackers to perform several administrative actions, including deleting the cache, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Severity: 4.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    I’ve been trying to figure out why these AR glasses cost $700, but I’m frankly stumped

    April 26, 2025

    Microsoft confirms Windows 10 KB5062554 breaks emoji picker’s search feature

    July 16, 2025

    CVE-2025-6104 – Wifi-soft UniBox Controller Os Command Injection Vulnerability

    June 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.