October is Cyber Security Awareness Month – a chance for us all to remember the importance of keeping our patient, corporate and personal data safe from threats!


Unlocked screens are a real threat to patient data. Locking your screens and logging out of systems helps to prevent unauthorised people from accessing sensitive or confidential information.
- π¨ Keep your screens and devices locked with they are not in use.
- π« Lock your screen when going away from your computer – to do this, press Windows Key+L or Ctrl+Alt+Delete
- π€ If you see someone leave their screen unlocked and unattended, gently remind them about the importance of locking their screen
Little steps do make a big difference to patient confidentiality.
Working from home?

Remember that cyber security does not stop at the hospital door. Lock your screen when stepping away, make sure your home WiFi is secure and keep sensitive NHS information away from family members and visitors.
A secure home workspace helps protect patient confidentiality and NHS systems from everywhere you work.
Staying secure at home:
- β Use software approved by your IT provider
- π Use secure networks
- π Lock your screen when stepping away from your device
Thanks for helping keep I.T. confidential over Cyber Security Awareness Month and beyond π
To read all our tips from Cyber Security Awareness Month, visit YourSpace
With Cyber Security Awareness Month underway, the second topic is dedicated to password security.

β οΈ Weak passwords are a real threat, as cyber criminals possess software which can crack them.
As a result, we encourage everyone who has not already done so, to make the switch to a passphrase on your Microsoft user account.
π€ What is a passphrase?
Passphrases are more secure than passwords and are nearly impossible to crack. A good example of a passphrase would contain:
- three random words that are a minimum of five characters
- spaces between those words.
π Why is a passphrase more secure than a password?
- Passphrases are easier to remember than a standard password containing special characters, numbers and letters combined. It would be easier to remember a line from a favourite song or favourite quotation than to remember a short but complicated password.
- Some passwords are relatively easy to guess or crack. Cyber criminals have developed state-of-the-art hacking tools that are designed to crack even the most complicated password.
- Passphrases easily meet complexity. The use of punctuation, upper/lower case in passphrases also meets the complexity requirements for passwords.
- Passphrases are nearly impossible to crack, because most password cracking tools break down at around 10 characters, so even the most advanced cracking tools won’t be able to guess or force their way into these passphrases.
- When combined with Multi-Factor Authentication (MFA), this creates enhanced security that provides a stronger authentication process that is also more user-friendly than remembering complex passwords and passphrases.
π¨ How do I change my password to a passphrase?
- Press Ctrl+Alt+Delete, and then click ‘Change a password’
- Type your old password followed by your new passphrase as indicated, and then type the new passphrase again to confirm it
- Press Enter.
π Do you need passphrase inspiration?
If you need help thinking of your new passphrase, we recommend using what3words, and choosing a location meaningful to you, adding in spaces.
Alternatively, you can use an online passphrase generator. Just make sure your generated passphrase conforms to the above passphrase requirements.

Good cyber security is everyone’s responsibility, and there are some simple steps you can take to remain secure. One of the most common attempts to breach cyber security defences is the use of scam emails.
Beware of scam and phishing emails π£
These emails are fraudulent messages that try to trick you into giving away personal, medical or financial information, or infect your device with malware to steal data.
These emails can be very convincing and may appear to come from a legitimate source, such as a person or organisation you know when they are actually being sent from a fake address – known as ‘email spoofing’.
Be email aware
- π€ Be suspicious of generic greetings such as "Dear sir or madam".
- π Check the sender’s email address to see if it looks legitimate.
- β Never open links or attachments from senders you don’t recognise.
- π Check the address of any links by hovering your mouse over the link (without opening it) to see if the address matches the link that was typed in the message.
- π€ Check for spelling mistakes and poor grammar which could indicate the email is a scam.
- π¨ Be suspicious of emails that claim you must click, call, or open an attachment immediately.
- π« Never provide financial or sensitive personal information like usernames and passwords over email.
What should you do if you suspect an email to be suspicious?
- π¨ If you receive an email that is unexpected or suspicious, do not open any links or attachments and delete it immediately. If you are concerned, get immediate support through the IM Digital Portal.
- βΈοΈ Pause and verify who you’re dealing with before sharing information, and make sure you are following security best practices and your organisation’s Information Governance (IG) policies and guidelines.
Further information and support
Please ensure you report anything suspicious immediately on the IM Digital Portal.
We thank you in advance for your support, please remain vigilant and help to keep I.T. confidential.

NHS organisations and staff are increasingly being targeted byβ―pretexting scams.
Pretextingβ―is a type of social engineering attack where someone pretends to be a trusted person to trick you into sharing information or carrying out an action. These scams aren’t limited to theβ―online world, such as tailgating.
Tailgating is when someone tries to get into a secure area by following another person through a locked door. For example, they might walk close behind you, grab the door before it closes, or say they’ve forgotten their ID badge.
Letting someone in without proper checks can put the organisation at risk. If you think this has happened, report it straight away to reception or security.
π Tailgating prevention tips for staff
- π¨ Be aware – Don’t assume everyone behind you is authorised.
- πͺͺ Identification – Always wear your ID badge visibly and check others are doing the same
- π Challenge politely – If someone tries to follow you in without a badge, ask: “Can I help you sign in?”
- πͺ Don’t hold the door – It may feel polite, but secure areas require individual access verification.
- π£οΈ Report suspicious behaviour – If something feels off, notify security or your manager immediately
- π Use access properly – Never prop open secure doors or let others use your credentials
- π€ Know your area – Understand which areas are restricted and who is authorised to enter
Further information and support
Please ensure you report anything suspicious immediately on the IM Digital Portal.
To explore all our tips for protecting yourself and your data, visit the Cyber Security Awareness Month page on YourSpace.
We thank you in advance for your support, please remain vigilant and help to keep I.T. confidential.
Why does cyber security matter?
Recently, NHS organisations have seen a big rise in scam emails and pretexting attacks. Pretexting is a type of social engineering, where someone pretends to be a trusted person to trick you into sharing information or taking action. This type of attack is not limited to online – it can take place through other forms of communication, including in person.
The NHS is a prime target – an attack could be far more damaging, affecting patient care across the country.
The 2017 WannaCry attack affected more than 60 NHS Trusts, spreading to over 200,000 computer systems worldwide. It doesn't take much to cause serious disruption – one weak password brought down a 158-year-old company.
Being cyber secure should be as normal as washing your hands. Whether working online or offline, help priotect our data by keeping I.T. confidential and following cyber security best practice.