Trojan Horse!
Back in the day, a wooden horse was left outside the walls of the city.
The incumbents saw it as a rather interesting gift!
Sadly, the gift was just a trick as the horse contained lots of soldiers who came out, after the horse was dragged inside, and overcame the city.
All was lost, the war was over!
Moving forward, into modern times, the concept of the "Trojan Horse" is still alive, and well, in the world of Computing.
We all know the Trojan Horse story but, maybe, we are not sharp enough to spot the derivative "Trojan" which drops into our inbox almost on a daily basis.
Yes, our modern Trojan" is very often in the shape of an incoming email - with an attachment.
To do any damage, the attachment has to be carried in and welcomed onto our PCs where, subsequently, it causes mayhem and damage.
Most of us already know this and are wary of any odd email offers.
Some of us, are less than careful.
So, how does a huge "Ransomeware" hit on the NHS take place?
Almost certainly on the back of one, or more, Trojan email attachments?
The bottom line is " What sort of training and protection are the technical men/women of the NHS providing, on our behalf, to make sure that no-one drags any of this stuff in?"
Is there a competent IT department?