Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Double-Edged Sustainability Sword Of AI In Web Design

      August 20, 2025

      Top 12 Reasons Enterprises Choose Node.js Development Services for Scalable Growth

      August 20, 2025

      GitHub’s coding agent can now be launched from anywhere on platform using new Agents panel

      August 20, 2025

      Stop writing tests: Automate fully with Generative AI

      August 19, 2025

      I’m a diehard Pixel fan, but I’m not upgrading to the Pixel 10. Here’s why

      August 21, 2025

      Google Pixel Watch 4 vs. Samsung Galaxy Watch 8: I compared the two best Androids, and here’s the winner

      August 21, 2025

      Get a free Amazon gift card up to $300 when you preorder a new Google Pixel 10 phone – here’s how

      August 21, 2025

      Everything announced at Made by Google 2025: Pixel 10 Pro, Fold, Watch 4, and more

      August 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Copy Errors as Markdown to Share With AI in Laravel 12.25

      August 21, 2025
      Recent

      Copy Errors as Markdown to Share With AI in Laravel 12.25

      August 21, 2025

      Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

      August 20, 2025

      Susan Etlinger, AI Analyst and Industry Watcher on Building Trust

      August 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025
      Recent

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025

      Microsoft is investigating Windows 11 KB5063878 SSD data corruption/failure issue

      August 20, 2025

      Microsoft Surface Won’t Turn On: 6 Tested Solutions to Fix

      August 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    NHS Charter Urges Vendors to Improve Cybersecurity to Prevent Ransomware

    May 19, 2025

    NHS charter cybersecurity pledge

    The UK’s National Health Service (NHS) is asking its IT suppliers to commit to better cybersecurity by signing a public charter.

    In a May 15 open letter to suppliers, top UK and NHS cyber officials urged suppliers to sign the NHS charter and pledge to adopt cybersecurity best practices that could help address a wave of crippling ransomware attacks that have hit NHS hospitals and healthcare facilities.

    A self-assessment form will be launched in the fall allowing suppliers to sign the NHS charter. That gives them several months to adopt the eight practices outlined in the open letter.

    NHS Charter Outlines 8 Cybersecurity Practices

    The eight cybersecurity practices outlined in the letter include:

    • Keeping systems up to date with the latest patches for known vulnerabilities;
    • Achieving and maintaining at least “Standards Met” as part of the Data Security and Protection Toolkit (DSPT);
    • Applying Multi-Factor Authentication (MFA) to networks and systems and supporting identity federation or MFA functionality on products;
    • Deploying effective around-the-clock cyber monitoring and logging of critical IT infrastructure;
    • Implementing immutable backups of critical business data and products, with tested business continuity and rapid recovery plans;
    • Board-level exercises “to ensure you are confident of your ability to respond in the event of a cyber attack”;
    • Reporting to clients in a timely manner, adhering to all regulatory requirements, and working collaboratively with NHS England in the event of a cyberattack affecting patient care or data;
    • Producing any software for NHS in adherence to the Department for Science, Innovation and Technology (DSIT)/National Cyber Security Centre (NCSC) software code of practice and committing to meeting the principles of secure design and development, secure build environment, secure deployment and maintenance and communication with customers.

    NHS Pledge Is Voluntary – And Doesn’t Change Legal Requirements

    While the NHS charter pledge is voluntary, the letter notes that organizations “will also have legal obligations to maintain the cyber security of the processes and systems you operate under arrangements with NHS organisations.”

    That includes contractual terms and other obligations such as Article 32 of UK GDPR requirements for appropriate technical and organizational measures appropriate to the risks to personal data. And DSPT requirements “remain whether or not you sign-up to the cyber security charter.”

    The letter – from Phil Huggins, National Chief Information Security Officer for Health and Care at the Department of Health and Social Care; Mike Fell, NHS England Director of Cyber Operations; and Vin Diwakar, National Director of Transformation for NHS England – noted that additional steps are also under development that include:

    • Developing tools that providers can use to identify their critical suppliers to carry out appropriate assurance;
    • Defining requirements for a national supplier management platform to map the supply chain and develop a risk assurance model “allowing us to identify and mitigate concentration risk”;
    • And reviewing the contractual frameworks that NHS organizations use to enter contracts so they have appropriate security schedules and clear expectations, which is part of a cross-government initiative.

    The letter also referred to the planned Cyber Security and Resilience Bill that is under development and aimed at protecting critical infrastructure. The bill is expected to be introduced to Parliament later this year.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuild an AI-powered text-to-SQL chatbot using Amazon Bedrock, Amazon MemoryDB, and Amazon RDS
    Next Article More Than 100 Groups and Individuals Oppose GDPR Changes

    Related Posts

    Development

    Copy Errors as Markdown to Share With AI in Laravel 12.25

    August 21, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 21, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Sakana AI Introduces Text-to-LoRA (T2L): A Hypernetwork that Generates Task-Specific LLM Adapters (LoRAs) based on a Text Description of the Task

    Machine Learning

    Basic Networking Part 4 — What is Port?

    Learning Resources

    CVE-2025-5385 – JeeWMS Path Traversal Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47733 – Microsoft Power Apps SSRF Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-47867 – Trend Micro Apex Central Local File Inclusion Remote Code Execution Vulnerability

    June 17, 2025

    CVE ID : CVE-2025-47867

    Published : June 17, 2025, 6:15 p.m. | 2 hours, 15 minutes ago

    Description : A Local File Inclusion vulnerability in a Trend Micro Apex Central widget in versions below 8.0.6955 could allow an attacker to include arbitrary files to execute as PHP code and lead to remote code execution on affected installations.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-54653 – VMware Virtualization File Module Path Traversal Vulnerability

    August 6, 2025

    CVE-2025-4285 – Rolantis Agentis SQL Injection Vulnerability

    July 22, 2025

    Font Selection Guidelines

    June 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.