Employees booting up computers at work Monday could see red as they discover they're victims of a global "ransomware" cyberattack that created chaos in 150 countries and could wreak even greater havoc as more malicious variations appear.
Australian organisations will return to work as the local fallout from the weekend's global cyber attack becomes clearer.
BLOOD tests will resume at hospitals across mid Essex following the NHS cyber attack last week.
NHS health boards in Scotland were warned in February of the need to review the resilience and backup procedures of their computer systems to protect patient data from cyber attacks, the Scottish Government said last night.
In the U.S. FedEx was hit.
More than 200 000 victims in 150 countries and regions were afflicted by the attacks with Russian Federation and the United Kingdom the worst hit.
The "Eternal Blue" tool developed by the National Security Agency had been dumped onto the public internet by a hacking group known as the Shadow Brokers.
The healthcare system in the United Kingdom is reeling from a ransomware attack.
Doctors surgeries in Tayside affected by the UK-wide NHS cyber-attack are now "operating as normal". However, many organizations - including hospitals - had not appropriately updated their systems.
Oxford University Hospitals NHS Foundation Trust said it has not been affected by the attack but Oxford University Hospitals NHS Foundation Trust communications manager Roy Probert said the trust is still remaining vigilant.
The ransomware has wormed its way into thousands of computers in an apparent extortion plot, shutting users out unless they cough up payment.
That being said, seven of the 47 of Britain's National Health Service trusts that were affected on Friday were still having IT troubles on Monday.
The Echo revealed yesterday that Southend Hospital acted in the nick of time to stop the attack causing widespread chaos. Microsoft, the software the infected computers were running on, released a security update in March to protect against the virus, and called this incident a "wake-up call".
Brad Smith, Microsoft president and chief legal officer, said: "We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world".