back to article Cancer patient forced to make terrible decision after Qilin attack on London hospitals

The latest figures suggest that around 1,500 medical procedures have been canceled across some of London's biggest hospitals in the four weeks since Qilin's ransomware attack hit pathology services provider Synnovis. But perhaps no single person was affected as severely as Johanna Groothuizen. Hanna – the name she goes by – is …

  1. Anonymous Coward
    Anonymous Coward

    Maybe they did her a favour?

    That reconstruction procedure was way higher risk even if all the systems had been online.

    Sure it was bad to allow the NHS to outsource a critical function to a vulnerable company instead of employing the local Linux consultant, but in this particular specific case she did in fact end up having a safer procedure, albeit not such a nice one....

    1. DS999 Silver badge

      Re: Maybe they did her a favour?

      The point is that her free choice was taken away from her. You may have chosen differently in her situation, but it was HER choice, not yours.

      1. Anonymous Coward
        Anonymous Coward

        Re: Maybe they did her a favour?

        I don’t know about anyone else, but I am tired of propaganda pieces.

        People here saying her choice was removed, well at least she wasn't being threatened to have her children placed into wardship. Yet that was exactly what happened to the parents of Ashya King.

        This is a propaganda piece, with unnamed sources, probably completely made up.

        El reg has form in this, regarding propaganda

        Sure, vote me down, vote me up, I don't give a shit about internet opinion, because again, it’s so easy to fake!

        Persona software exists for this exact type of shenanigan.

        1. Anonymous Coward
          Anonymous Coward

          Re: Maybe they did her a favour?

          The source was the patient herself. There is a public discussion thread on her Twitter arranging a meet-up with the Register journalist to talk about it, after she responded to the Register's tweet of their 20 June article on Qilin.

    2. Jamie Jones Silver badge

      Re: Maybe they did her a favour?

      Anonymous Coward with no details of the case knows more than the experts and the patient that are fully briefed on her particular situation.

      If only they'd asked you - it would have saved all sorts of anguish.

      1. Martin-73 Silver badge

        Re: Maybe they did her a favour?

        probably would have installed linux on her missing breast. Absolute troill

    3. Jase Prasad

      Re: Maybe they did her a favour?

      I think it was her limited ability to decide that was further narrowed until she was left with no choice at all.

    4. C.M.R...
      FAIL

      Re: Maybe they did her a favour?

      Clearly you or your love done has never been in that position. It is a very difficult time for the whole family and for this to change a difficult decision at the last minute would have been almost unbearable for her and them. If I were you I'd do the decent thing and delete your idiotic comment.

      1. Anonymous Coward
        Anonymous Coward

        Re: Maybe they did her a favour?

        Comment was meant to take issue with the article's headline "terrible decision".

        Taken at face value, that reads like the decision she made (to go ahead with the safer procedure) was the wrong one. Having been in a similar position before I'm not convinced. But you're right it should have been her choice. Still, we need a better heading, one that can't be misread as "the option she took was the wrong option" instead of "it was terrible that she had to make a decision like this under time pressure".

        1. Lord Elpuss Silver badge

          Re: Maybe they did her a favour?

          I think you've been slaughtered enough in the downvotes but I see what you're saying - the headline was badly written. It's terrible that she was forced to make the decision in this way, not that the decision she made was a terrible one.

        2. I am the liquor

          Re: Maybe they did her a favour?

          If you just wanted to comment on an ambiguous choice of words in the headline, why start with an antagonistic phrase like "Maybe they did her a favour"?

          1. Anonymous Coward
            Anonymous Coward

            Re: Maybe they did her a favour?

            because I was trying (badly) to fight fire with fire

    5. ScottishYorkshireMan

      Re: Maybe they did her a favour?

      Looks like AC now seems to mean ASSHOLE COMMENT.....

      1. Lord Elpuss Silver badge

        Re: Maybe they did her a favour?

        As does ScottishYorkshireMan, apparently.

  2. Rich 2 Silver badge

    Justice

    I’m sure if a sizeable bounty was put out, the identity and locations of the people responsible would be quickly forthcoming (i indeed that information is not already known)

    And I’m also sure that it’s not beyond the wit of any wealthy and resourceful government to arrange appropriate hits, regardless of where they are located.

    All illegal etc etc but wealthy and resourceful governments do dodgy stuff and cover-up illegal stuff all the time. And in cases like this, I’m thinking the vast majority of people would turn a blind eye.

    Just sayin’

    1. Conundrum1885

      Re: Justice

      Legally speaking, the 'Computer Misuse Act' and other legislation hobbles legitimate cyber-security researchers.

      So amend it. Add a clause that 'Any action taken on the Internet against suspected cyber criminals or cyber terrorists by agents of HM Government for the greater good of GB or its allies is permitted'

      Add an additional clause that backdates it to the first recorded ransomware attack so anyone who has been convicted but was acting with the best interests of the country or as an agent of HM Government is retroactively exonerated.

      Are you listening, Prime Minister Keir Starmer?

      1. trindflo Silver badge

        Re: Justice

        I don't know that I'd go as far as 'any act for the greater good', but I could certainly see that if health infrastructure is hit so as to put people's health and lives in danger, that is a direct assault on citizens and most means of redress are on the table. Most...it wouldn't be reasonable to nuke the city the murderers live in. And I think murderer is a reasonable appellation to give someone that hits health infrastructure like that.

        1. LybsterRoy Silver badge
          Joke

          Re: Justice

          -- it wouldn't be reasonable to nuke the city the murderers live in --

          Not even from orbit?

        2. Jamie Jones Silver badge
          Joke

          Re: Justice

          ".it wouldn't be reasonable to nuke the city the murderers live in."

          .... unless it was Milton Keynes!

          1. werdsmith Silver badge

            Re: Justice

            .... unless it was Milton Keynes!

            Did you fall asleep in the 1980s whilst listening to a cheesey radio DJ and you just woke up?

            1. Jamie Jones Silver badge

              Re: Justice

              No, I was making a joke, and chose a place name at random (actually, it was my second random choice; i was worried my first random city name would be considered racist)

              Apologies for your lack of understanding of the "joke" icon, and I'm sure it's a very nice place indeed.

              Let me replace "Milton Keynes" with "Swansea", my home town:

              "... unless it was Swansea!"

              There. Does that make you feel better?

              It reminds me of a joke I heard on TV a long long time ago ("Who Dares Wins") in the 80's. It went something like "The government has revealed a new highly sophisticated self-homing missile. It only attacks Swansea'.

              Despite being a mere kid at the time, I didn't get all offended, or feel the need to object. But maybe that's just me.

              1. collinsl Silver badge

                Re: Justice

                > "... unless it was Swansea!"

                And now you're an anti-Welsh racist. Congrats.

      2. Martin-73 Silver badge

        Re: Justice

        I would go further, maybe send in special forces to liquidate these idiiots.

        1. Anonymous Coward
          Anonymous Coward

          Re: Justice

          but slowly, wishing there was any medical help they could get.

        2. Lord Elpuss Silver badge

          Re: Justice

          Liquidate in the literal sense. From the feet up. In a vat of something nasty.

      3. Brad Ackerman

        Re: Justice

        Part 5 of the Investigatory Powers Act 2016 already allows intelligence agencies to apply for a warrant to conduct equipment interference (i.e., CNA); no additional statutory authority is required for government agencies to conduct cyberspace or kinetic operations against ransomware operators.

    2. Jamie Jones Silver badge

      Re: Justice

      Before a hit, they should surgically remove one of their breasts, or more likely, their dick

      1. Richard Jones 1
        Angel

        Re: Justice

        Shame they would have to skip the anaesthetic stage.

      2. Lord Elpuss Silver badge

        Re: Justice

        Why more likely their dick? That's a massively sexist generalization.

        I mean - statistically you may well be right. But we get cancelled when we generalise women, so let's not do the Feminazi's job for them here.

        1. Anonymous Coward
          Anonymous Coward

          Re: Justice

          "I mean - statistically you may well be right."

          Or, expressed another way: "more likely".

          1. Lord Elpuss Silver badge

            Re: Justice

            No, expressed another way "you may well be right, but we still shouldn't be generalising across genders without evidence."

            Because it's exactly what the Feminazis do ("All men are pigs") and what they accuse us of doing ("You obviously hate women")".

      3. Anonymous Coward
        Anonymous Coward

        Re: remove their dick

        Why not remove something they have a use for instead?

  3. Version 1.0 Silver badge
    Boffin

    Work to hack everything helps.

    My experience has been that you can probably work to prevent a ransomware attack by spending a few months working out how to do the ransomware attack on your system yourself. This kind of work helps you understand how an attack is done so that you can work to try and prevent it happening and since you now know how it happens then you will have a good plan to avoid being completely unable to work around an attack when it happens. Backup everything essential into a completely inaccessible environment that can not be seen except by yourself - I did that on my company years ago (we were never hacked) by creating a fully backup of everything on a server ... I have always used my humor so the backup server name was MACAVITY and when everyone on the network (even local workers) tried to access the server they discovered that Macavity wasn't there .... LOL, I love the Cats show and music, but we were prepared to survive a hack.

    We were never hacked, I hope that because once I'd learned to hack everything, I was able to see what I needed to do so that I could keep us safe and that worked for me.

    1. Anonymous Coward
      Anonymous Coward

      Re: Work to hack everything helps.

      Ensuring the ability to recover is the reason behind BCM (because issues can also lie outside IT, for instance a fire or an epidemic), so well done for practicing at least one scenario (BCM is worthless having if it's not trained and tested).

      It's so important that you now have NIS2, and for anything in finance its more aggressive sister DORA. DORA is entertaining in that it caused a massive panic amongst bank directors in Germany when their government decided they would become personally liable for any failures there, so no more hiding incompetence behind the corporation.

      Personally I'd like to see that idea applied more widely, it surely would change a few things.

      1. a_builder

        Re: Work to hack everything helps.

        That’ll be DORA the explorer?

    2. Jamie Jones Silver badge

      Re: Work to hack everything helps.

      Spending some time officially "ethical hacking" at my last place of work was both fun, and depressing... I'd already stumbled on so many holes in the previous few years from just doing my normal job, that there wasn't a high bar going in, but still it was shocking.

      I'm not talking about silly mistakes or bugs, but systems (various unix systems, dns configurations, routers) that had been setup or had software running that had obviously been written by people with no clue of the concepts.

      A fun little example was the discovery of a script, rolled out across many 100's of machines all over the UK which ran as root, and would perform root-sanctioned personalised maintenance commands for users by running a script (if it existed) in the users home directory.

      All users home directories were preinstalled with a blank script file, owned by root, to stop people creating their own scripts.

      Whoever wrote that didn't realise that if I own the directory, I can delete files in it, even if they aren't owned by me, so whilst a user couldn't modify the script file directly, they could just delete it and create their own, that would blindly run with full root privs.

      Now, even if the system worked in a way that a user couldn't do that, the premise of sticking privileged scripts in a users directory like that is a terrible one to begin with, so it wasn't just a lack of knowledge of unix permissions, but a failure to grasp the whole concept.

      Mind you, this is the place where I had to debug some C code on an unrelated matter to find this line many times throught the source:

      system ("sleep 1");

    3. This post has been deleted by its author

    4. Lord Elpuss Silver badge

      Re: Work to hack everything helps.

      1. You will not be able to uncover every possible avenue of attack, and there will always be things you haven't considered. You can (and should) invest in working out how attacks are done, including doing them yourself, as much as you can, but there will always be new avenues.

      2. Backing up to a completely inaccessible environment is either completely impossible, or completely useless. Any time you feed data in to be backed up (which you need to do regularly in order to keep it up to date), there's a risk that malware will piggyback in as well. If your environment IS completely inaccessible, then it's useless as a backup.

      3. You never "learn to hack everything". And believing that you did means you're highly vulnerable but you don't know it.

    5. Mendy

      Re: Work to hack everything helps.

      Related to that we've found it quite beneficial for managers and whoever has seen these things in the paper to come to the meetings and ask why whatever happened here wouldn't happen to us. They go away reassured, we make sure we're not going to fall foul of anything we should have been aware of.

  4. Anonymous Coward
    Anonymous Coward

    As a writer, there’s a statement: if you’ve hit writers block, the problem isn’t in the bit you’re writing; look a paragraph or three back.

    What utter nonsense to blame strikes for their failures to give appropriate care. The problem is that some middle manager figured they could save money, and he could get a bonus with this scheme, by deferring upgrades, by skimping to the absolute limit on IT security. This wasn’t last week’s strikes, it was a systemic failure a few paragraphs back, in hopes of “saving money” by not actually doing necessary work.

    That last bit blaming strikers for management’s failures is practically criminal responsibility shirking.

    1. doublelayer Silver badge

      In this incident, you are correct, but not everything works the same way as writer's block. There are indeed situations where the last negative event is the cause of the current situation and preventing it before that event occurred was either impossible or impractical. To blame the damage caused by the malware on striking employees is flawed logic, but to claim that a strike won't have negative effects of a different sort is also flawed. You may also want to consider that the statement where the action was mentioned wasn't trying to blame it for the specific incident covered in the article or for the damage caused by ransomware in general. At most, the strike was being blamed for a more difficult recovery from those independent events. You can easily disagree with that allegation, but not if you interpret the statement as trying to blame striking workers for something the ransomware broke, because then you're fighting against something with no defenders.

    2. CowHorseFrog Silver badge

      no. sorry the problem is managers often on high pay are making decisions they have no technical understanding of the consequences. They should be chArged with fraud becauese yet again it shows they are claiing skills they clearly do not have.

  5. CowHorseFrog Silver badge

    they should fire and charge the managers who selected that provider for failing to select a provider with proper procedures.

  6. perkele

    May the perpetuators get cancer of the knob & it drops off, painful piles & other unpleasant shitty things, and hopefully living in a shit country with no access to healthcare.

    Depressing reading just before bed. From someone who themselves is classed as a seriously ill person with a higher cancer risk & others as a side effect symptom (post organ transplant).

    1. Anonymous Cowpilot

      I understand where your sentiment comes from. My wife had a similar experience although it was COVID rarher than a ransomware attack that prevented her having reconstruction.

      However, cancer is a truly horrible thing and i would never wish it on anyone, even the perpetrators of this attack.

      1. herman Silver badge

        Acceptance

        With cancer, there eventually comes acceptance. I am still alive; I am not as strong as I used to be; if it comes back, there is no further treatment, so why bother testing every six months.

        As for this lady, she can have the remaining one reduced and the get a small Bulgarian Airbag for the mutilated one and then get on with her life - it will be different, but she is not dead yet.

      2. Anonymous Coward
        Anonymous Coward

        Really? No one?

        Because I'd truly love it if Putin and Netanyahu both got untreatable ass cancer.

  7. Tron Silver badge

    Hackers are responsible for what they do, but not solely.

    If you rely on tech, you must have a working manual fall back for when it falls over. And you need to test it like a fire or quake drill. The idea that you just stop functioning because your tech is down is not acceptable. If you can't function without tech you shouldn't be insurable and shouldn't be trusted with life or death facilities.

    And if stuff is life or death or basic infrastructure, your tech should never touch the public internet. It should be air gapped. Two systems, two screens on every desk, whatever it takes.

    There is no excuse not to have better resilience in enterprise tech, and no excuse if you don't have a manual fall back. Whatever you do, you have a duty to devise and train staff for reversion to manual.

    The same goes for schools closing because their tech is down and their 'safeguarding' doesn't work. Pathetic.

    1. Conundrum1885

      Re: Hackers are responsible for what they do, but not solely.

      True, the problem is cost.

      Companies frequently get rid of their paper archives because they only need to keep it for n years then it gets 'stored securely' and finally shredded.

      Health archives are IIRC 25 years for most data, though typically as I discovered for personal reasons MRI/CT/etc scans can be stored elsewhere.

      HIPAA is a big problem because the definition of 'secure' normally means full disk encryption then what happens if a hardware failure nukes the key?

      I have it on good authority that the NHS store ransomware attacked or failed drives just in case one day someone cracks the encryption.

      1. Pascal Monett Silver badge

        Re: just in case one day someone cracks the encryption

        I doubt that. Someone would have to be working on the encryption to hack it, and if the disks are stored, nobody is working on it.

        But I might well be wrong, and somehow I hope I am.

        1. Jon 37 Silver badge

          Re: just in case one day someone cracks the encryption

          Some of the older malware used crap encryption. Eventually, a researcher studying the malware would figure out how to decrypt the data. That decrypt would work for all victims.

          Or the control server with all the decryption keys would be seized and all the victims could get the keys to their data, without paying.

          Those attacks break an entire piece of malware at once, they don't require studying a specific victim's disk. If you were the victim of that particular piece of malware, and you kept your disks, then you could decrypt them.

          These attacks are much less common nowadays, malware authors have learnt to avoid them.

          1. Martin M

            Re: just in case one day someone cracks the encryption

            Medical information has value for very many decades. Unless the ransomware gangs are using post-quantum cryptography, it’s possible that swathes of encrypted data might be broken by quantum cryptanalysis over that time.

    2. Curious

      Re: Hackers are responsible for what they do, but not solely.

      In healthcare and medicine, there's audits on managing documentation and seen as a management failure to have old hardcopy available, which won't be looked on well in a court trial / investigation

      Many managers take the digital only option, because it's easier to control that employees have only the current edition. Most employees won't have easy assess to print.

      Having Quality Control people constantly searching each room in huge premises and replacing out paper folders isn't a task that management aren't willing to pay the overhead on.

    3. Mendy

      Re: Hackers are responsible for what they do, but not solely.

      "And if stuff is life or death or basic infrastructure, your tech should never touch the public internet"

      NHS policy is that services should now be on the public internet (and hence secured accordingly). I think part of this is that there had been an assumption that N3/HSCN was secure but we were getting almost as many port scans etc. from compromised machines as we were on the internet.

  8. Pascal Monett Silver badge

    I wish her the best

    She's young, she still has her life in front of her. I hope that her cancer is over and that she will be able to live a full and fulfilling life with her spouse and children.

    It is horrible to have been put through such an ordeal. Cancer is already bad enough as it is without being forced to make life-changing decisions literally right before going under the knife.

    But, having lost my mother to ovarian cancer when she was only 63, I can't help but approve her decision. I'm sure her husband prefers her with one boob rather than not having her at all. Maybe, just maybe, it is a good thing for her and she will be able to have reconstructive surgery at a later date when all is well and the whole problem is over. I just wish her the best.

    But it is still criminal to have put her through all that.

  9. Bebu

    I often wonder....

    Why these fairly critical systems are connected to the great unwashed internet. Dedicated restricted and protected networks that only internetwork with other equally secure networks in a very controlled manner make a lot of sense. But I suppose using the commodity internet is a lot less expensive and seemingly more convenient but unfortunately for malefactors too.

    The technology for very secure systems and networks has been available for quite some time - even 802.1x dates from the early noughties.

    I would hope that the critical control systems of nuclear reactors aren't connected to the internet, but that might be forlorn.

    Always seems cheap and nasty, quick and dirty or easy, wins every time hence the cowboys have the run of the range so it's no surprise the rustlers are able to succeed in their perfidy.

    1. Anonymous Coward
      Anonymous Coward

      Re: I often wonder....

      I wonder why we continue to use an OS and a provider that has shown no significant improvement in security in over 40 years of writing code.

      Yes, you have lovely layers on top of that, but, to use a medical approach, sticking plasters on a wound without first cleaning it thoroughly may make it look pretty, underneath it's remains a festering mess.

      Add to that the absolutely atrocious interfaces on devices you may need in a hurry and the ROI on getting it right (like not losing days worth of productivity because of yet another patch) and frankly it's irresponsible in the extreme.

      1. doublelayer Silver badge

        Re: I often wonder....

        You're right, we should dump any operating system that Qilin's ransomware can run on. So that's Linux out then. There's a Windows version too. Macs for everybody?

        1. Anonymous Coward
          Anonymous Coward

          Re: I often wonder....

          That article analyses the x86 Linux encryptor but doesn't say anything about how the encryptor gets onto the box in the first place. With ransomware that's usually "trick someone into running code from an email". That step right there is much harder to pull off in Linux, because the system is far less likely to be set up so it's just one click.

          Linux gives you *more* protection than Windows.

          Nobody said it's perfect, but it's still better. On top of that, Linux sysadmins tend to be better at their jobs than Windows sysadmins (sure there's bound to be an exception somewhere but look at the whole picture).

          1. Peter Gathercole Silver badge

            Re: I often wonder....

            Sorry to put a dampener on your Linux position, but it doesn't matter how good the OS is (and UNIX-like OSs have some important differences from Windows), these protections are quite easy to disable, and this happens frequently in the name of 'maintainability'.

            I have been a UNIX admin., system integrator and troubleshooter for over 40 years. In that time, the skill level of your average system administrator has gone down as time has passed. And this is not just the mainstream. Back when it was a niche profession, people normally only got into it if they were really interested. If they were interested, most would want to be as good as they could.

            I laughed out loud at the comment above for the 'system ("sleep(1)")'. I have seen call out to shell commands for trivial reasons from inside a compiled program so frequently that I was surprised it caught me the way it did.

            IMHO, the profession started changing in the '80s and 90's, when 'computing' and 'IT' started being seen as a sexy and well paid profession. People came to it to earn money, and as a result often saw it as just a job. The result? People who weren't really invested in doing the best job possible, whether it was designing systems, writing the software or looking after them.

            But I feel that the vulnerability to ransom-ware attacks is principally a design issue, because today's architects are yesterday's 'just-a-job' programmers and system admins. They're driven often by cost to just think about ease of access and maintainability, so design environments such that data stored on shares is often not sufficiently segregated or controlled by the protections that are already built in to all mainstream OSs, and often domains are far larger, or have too many trusts to other domains, than is conducive to secure operations. Things may change now, but there's a lot of technical debt.

            This means that if a miscreant gets access with the relevant privilege, they can tear through the whole environment with staggering speed, with few barriers to stop them, often being able to do significant damage to widely accessible data from non-privileged accounts. This can be the case for data accessed in network shares even from Linux or other systems.

            We need new thinking, segregating data and controlling access in line with least-privilege principals. We need to move away from "Hey, I can administer the whole environment from this one domain account". For the most sensitive data, we need significant control of what data can be seen by whom and from where. Segregation will not stop this type of attack, but will limit it.

            I'm not actually sure whether this will align with "Zero Trust" (I'm still trying to make sense of the many different interpretations of this), but where we are now is almost the worst of all worlds.

        2. Anonymous Coward
          Anonymous Coward

          Re: I often wonder....

          well I'd run the health service on BSD

      2. herman Silver badge

        Re: I often wonder....

        To use an olde Austrian analogy: Windows has the essence of death on its code base.

        1. Anonymous Coward
          Anonymous Coward

          Re: I often wonder....

          I'd put it simpler: you want to run these critical services off an OS made for gaming?

  10. Anonymous Coward
    Anonymous Coward

    People who engaged in this should be done for attempted murder

    That even applies if there have been any actual deaths because (a) the potential is there and (b) the targeting was not by accident.

    Oh, and refusal to be treated for as much as a hangnail by anyone in the medical profession for the rest of their hopefully short lives.

    As Keanu Reeves said in John Wick 4: consequences.

    1. Conundrum1885

      Re: People who engaged in this should be done for attempted murder

      Screw attempted, add a "Conspiracy to Murder" charge. That ought to have the desired effect ie a whole life term. Preferably in Broadmoor.

      Should bring back Judge 'Isaac C. Parker' already.

      Or.. https://youtu.be/1_aqdOpD7x0

    2. Caver_Dave Silver badge

      Re: People who engaged in this should be done for attempted murder

      Start that with the managers who would not fund the necessary IT upgrades.

  11. Jason Bloomberg Silver badge
    FAIL

    "too risky because Synnovis was unable to support blood transfusions"

    What staggers me is there was no alternative other than forcing the patient to decide between two less than ideal options.

    Was there really no option to ship her off to some other hospital, have whatever blood tests needed to be done as a matter of urgency, then get the preferred and most desirable operation done?

    It's not like they didn't have days to prepare a Plan B.

    1. Boris the Cockroach Silver badge
      FAIL

      Re: "too risky because Synnovis was unable to support blood transfusions"

      Quote

      "It's not like they didn't have days to prepare a Plan B."

      they had a plan B, however that provider used the same blood testing and supply company that they did........................................

      Bit like the data center that has a network cable to provide backup to the main network cable.... however they both run in the same pipe thats about to be dug up by a JCB...................

  12. Zarno
    Mushroom

    There is a special place in the underworld...

    There is a special place in the underworld for vile scum.

    These entities deserve the place that's even more below that.

    Messing with critical medical infrastructure is abhorent.

    I feel the icon would be too lenient a punishment, but it's a start.

  13. GreyWolf

    Pardon my ignorance...

    but is Synnovis really the only path lab available?

    That right there is the single point of failure.

    Pretty feeble of the NHS to not have a second path lab available, and the hospital to not have a backup contract in place ready to roll.

    1. PRR Silver badge
      Boffin

      Re: Pardon my ignorance...

      > is Synnovis really the only path lab available?

      Ask around. You may be surprised. (Your doctor may not know, ask Staff.)

      In downeast Maine USA, there is ONE full path lab in a 200 mile radius. Good pathologists and labs are not cheap, and as a matter of money we don't have enough people to support modern mega medicine. While a surgeon's tech can peek a microscope during a flesh-sparing cancer operation to guess where to stop cutting (her breast, my bladder, whatever you don't want to just amputate), that not as ideal.

      Also my dog found out that for certain conditions there are drugs he could only get from the pharmacy inside the people hospital. Hanging around the sick-house, waiting on heavy paperwork and non-standard dilutions (he was only 30 pounds) and heavy expenses at the peak of pandemic.

  14. ScottishYorkshireMan

    So, this is what happens...

    when you get a government hell bent on getting all the money it can from private healthcare, and reducing the spend dramatically for the NHS. This is the sort of thing that happens. After all, the NHS gets a pile of cash, but how much of that cash is diverted to private companies with an MP as either a director, major shareholder or having received a bung (yes Mr Streeting, its been well documented) https://www.thenational.scot/news/24250557.wes-streeting-takes-175k-donors-linked-private-health-firms/ ( A touch of hail the new boss, same as the old boss????)

    Which makes me wonder about the NHS, its quite apparent that it needs the private assistance but is the NHS getting the right private assistance or is it getting the one that was provided by a brown envelope stacked with cash? Probably not cash though, wouldn't get thru ALM would it. Probably just into an offshore account and His Majesties Recovery Company don't see it either.

  15. Strong as Taishan Mountains

    Unfortunately a feature, not a bug of corporate management now

    It seems 90% of Western corporations have decided "risk management" is better than "prevention". (Risk management meaning a massaged copy of the risk assessment is handed in after decision makers threaten their IT dept into not giving a frank risk assessment)

    So seems it'll go the way of everything else, stuff some money into a ransomware insurance plan to pay the toll when it happens. Worst case? Some idiot consumer dies and your company rebuilds. Nothing changes until the decision makers are held personally responsible for putting industrial controllers/medical databases on non-secured networks.

    Really, one of these days someone is going to find an exposed port on an IC which happens to be connected to something terrifying.

    The horse will be far out of the barn, lessons will be learned, maybe then something will change.

  16. Anonymous Coward
    Anonymous Coward

    My opinion

    Medical

    Military

    Media

    Murderous

    Avoid these institutions as if your life depended on it

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like