What happened when security experts spent 8 days trying to hack our software

Record GP appointments highlight need for efficient referral management hero banner

Why “built in” security matters more than “bolted on” compliance

By Jeffrey van Schoor, Head of Projects & Operations at DXS

At DXS, protecting patient data and clinical systems is a fundamental responsibility. We commission annual independent security assessments of our software, and we’re sharing the results from our latest testing.

What we tested

We engaged JUMPSEC, a CREST-certified cybersecurity consultancy, to conduct an eight-day penetration test of our clinical applications. Their consultants tested for potential vulnerabilities including application exploits, privilege escalation, and database security issues.

What we found

The assessment identified minimal security findings. This reflects our practice of integrating security considerations throughout our development process, from initial design through to deployment.

Why this matters to you

Healthcare systems face real cybersecurity threats. Recent incidents, including the Synnovis ransomware attack that disrupted NHS services, demonstrate the impact when security defences fail.

For organisations relying on DXS software to support clinical decisions, these testing results provide evidence that we’re building systems with security built in – not bolted on afterwards.

How we approach security

Annual penetration testing is one part of how we approach security. We work with independent security specialists, address findings through our development processes, and maintain focus on protecting the systems our users depend on.

Healthcare professionals use DXS software to support critical clinical decisions. We take that responsibility seriously, and independent security testing helps us demonstrate that commitment.

Personalised, connected care