This site uses cookies to store information on your computer. I'm fine with this Cookie information

Team Brief logo

Team Brief is the monthly communication to all staff from the Chief Executive which is cascaded throughout the organisation to give local managers the opportunity to add to the core corporate messages and localise them. A feedback facility ensures that Team Brief addresses the issues raised by staff.

A full archive of Team Brief is available on StaffNet (you must be on the NHS network to access).

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

Team Brief - February 2017

Robert Calderwood, Chief Executive talks about:

  • Leading the way
  • Cyber attack threat is real

Leading the way

A new report from the Royal College of Paediatrics and Child Health has identified poverty being at the root of many child health problems.

It highlighted the stark inequalities in child health and that despite huge improvements over the past 100 years that progress has slowed over the past decade.

The link between poverty and child health has been the very reason that we in Greater Glasgow and Clyde have put so much into developing our Healthier, Wealthier Children programme. Everyone involved in this initiative should feel proud of what has been achieved – I know I was heartened to hear the initiative being showcased as one of the best examples in the UK by commentators when the Royal College report was published.

We have helped access more than £37m for patients through referral to money advice services and assistance with debt worries and tackling poverty is key to tackling health inequality.

Our continued commitment to tackling inequalities – including our Healthier, Wealthier Children programme – and delivering a Fairer NHS for the patients and communities we serve is something we, and our social care partners, should all feel very proud of.

Cyber attack threat is real

There’s a growing concern throughout the country about the risks of cyber attacks on IT systems both in the private and public sector.

Only last week cyber attacks were identified as being one of the top four risks to UK national security sparking a debate in Parliament which identified the UK ranking well below other countries including Brazil, South Africa and China in keeping laptops and phones secure.

The risks should not just be seen at international and governmental level though - at a local level it is also a huge risk to all of us personally and to the business of our health board and the security of the information of our patients.

Only a few days ago we were informed by one of our service providers, Landauer, that it suffered a data security attack.

The company provides radiation monitoring for NHS Boards across Scotland and holds personal information on NHS staff including names, radiation dose and, in some cases, dates of birth and National Insurance Numbers.

Swift counter action following the attack secured the servers and all staff involved were contacted and offered free credit monitoring support.

This brings in to sharp focus the need for us all to take IT security extremely seriously.

Our eHealth directorate are launching the first in a series of monthly staff security briefings this month which I urge everyone to read and apply to their daily routine.

The eHealth experts already has an armoury of “weapons” to protect our systems and information, however, any such security systems can be compromised if we all don’t play our part in applying security measures.

There is a rise in the number of bogus telephone calls where the caller claims they are from an IT service and ask for details to access your PC or other device.

Another method of cyber attack is via email. The sender attempts to get you to open an email, an attachment or a link enabling a third party to access you machine.

eHealth have created detailed advice for staff on how they can thwart such attacks and I have asked for this information to be placed a Hot Topic on the home page of our StaffNet and also issued as an all-staff Core Brief.

Comments/feedback to: [email protected]