The infection of 4,700 PCs by a worm at three London hospitals in mid-November was "entirely avoidable," according to an independent security review.
The PCs at St. Bartholomew's, the Royal London Hospital and The London Chest Hospital were infected with Mytob, a mass-mailing worm also known as MyDoom. Emergency patients were temporarily diverted to other facilities, but officials said no personal data was lost.
After the infection, the hospitals commissioned a specialist IT consultancy to analyse the incident. Although the full report is not public due to security concerns, a summary of its findings has been released.
The review concluded there was a "substantive failure" in the medical group's information governance processes. Anti-virus software on the PCs was updated on a daily basis prior to the attack, but the software was not configured correctly on some PCs.
"This left a 'back door' for the virus to infiltrate the network," the review said.
Mytob was "introduced accidentally" into the hospitals' networks and there was no "malicious intent," the review said.
The hospitals' PCs were running McAfee 8.5 anti-virus software, a product also known as VirusScan Enterprise. Most antivirus products - including that McAfee product - can detect and remove Mytob, but the malware continues to circulate on the Internet despite its discovery in early 2005.
After the infection, the hospitals declared an "internal major incident" on 18 November until 24 November Most PCs were cleared of the infection and working again by early December.
The hospitals are now embarking on a programme to shore up management systems and processes, the review said. The programme calls for additional staff training and changes to command and control structures, among other measures, and should be complete by April.
Although patients were not severely affected, the review notes "this incident could have threatened the well-being of patients and morale of staff as well as the long-term reputation" of the hospitals.
British hospitals are not the only organisations to be severely hit by common infections. In mid-January, the Ministry of Defence was hit with a rapidly-spreading virus that forced administrators to shut down systems across the organisation, cutting off email and web access.
The Ministry said war-fighting systems were not affected. It did not release details of the specific type of malware, but said it did not appear to be intentionally targeting military systems.
Find your next job with techworld jobs