The estimate breaks down the cost across the period of the attack, from 12-17 May 2017, and the recovery period over the following two months.
The £19m figure was arrived at by anticipating that 1% of care was disrupted over one week, based on an estimate of the average level of care provided across the entire NHS during a one-week period.
Assuming that all the trusts that were severely affected would have needed the equivalent of five days’ full-time equivalent (FTE) resource of a single IT consultant, the cost of IT support during the attack hit £500,000.
In the following two months, the DHSC estimated an average level of resource required by affected trusts, based on size and severity of disruption, added a further £72m to the total.
In its previous update in February 2018, the department said it had agreed £150m of investment in security over the next three years, and £44m in 2017/18. It has now spent £61m in 2017/18 – £15m more than planned in February – after it was able to utilise underspends from elsewhere.
Added to similar levels of spending in 2019/20 and 2020/21, it has now estimated that it will spend £275m on security – a figure that excludes investment by local organisations and wider national IT funding in support of better security, such as the move to migrate all its computer systems to Microsoft Windows 10.
Initial phases of investment were targeted at major trauma centres and ambulance trusts. The report detailed two relevant case studies, one with an unnamed ambulance trust that was awarded £260,000 to replace legacy firewalls and servers on a mobile data system, and invested in more disk space to create detailed data logs to assist in service recovery should it be attacked again; and the other was an undisclosed university hospital trust that received £1.5m to spend on enhanced antivirus and patching services, a security event information management (SIEM) system to give it better control over its network, and a new generation of smart firewalls to handle external data flows as it migrates more services into the cloud.
The report said that overall, the NHS was making good progress in implementing improved cyber security programmes, with all trusts and foundation trusts now having recruited a board-level member with responsibility for cyber security (with one undisclosed exception).
Elsewhere, NHS Digital and NHS England continue to trial a number of intervention programmes and are currently piloting the delivery of GCHQ-accredited board-level training; facilitating system-hardening capabilities; triaging risks and vulnerabilities to prioritise investment; and reviewing and remediating identity and access management issues.
The report also noted progress on implementing a three-year deal with IBM, signed in June 2018, to deliver a new cyber security operations centre for NHS Digital.
This article originally appeared on ComputerWeekly.com