This is nothing compared to the NHS
Working as a senior consultant across public sector IT (this isn't my real name), I have seen some security horrors, the worst by far being the NHS. NHS Digital specifies strict and reasonably secure standards for NHS organisations to follow, but the truth is many parts of the NHS take no notice. The security in some trusts is beyond terrible; each trust operates hospitals, provides care for up to a million or more patients and is trusted with ALL our clinical records. However, I have seen trusts with hundreds of external users (no MFA) who have had these accounts for years and from anywhere on the internet, have full access to the trust's clinical records, where the trust has NO idea who these people are or when they log on, what they access, how they use the system, etc. Worse still, even senior IT staff and executive management don't understand that this is in any way bad. It's bonkers. I have had conversations with trust chief execs, trying to get them to realise how bad this sort of thing is, and there is almost no realisation or engagement forthcoming. I'm not making this up!
This is just one example of the sorts of things I have seen. Another is lax network and server security. I have seen trusts with tons of unpatched Windows 2008 servers with SMB1 enabled and no SMB1 enabled between all subnets on the network FOUR years after wanna cry. I have seen the Oracle DB hosting all clinical records for one trust published to the internet via ODBC and a simple (trivial to guess) username-password combo. There is very rarely any monitoring, SIEM, log interrogation, etc., in place at any NHS org I have worked with.
All these examples are within the last 3-5 years. I can confidently predict that there are few places in our NHS that haven't already been compromised by bad actors, and that should worry us all.