NHS Shetland has suffered no direct impact on its IT systems following the world wide cyber attack on Friday.
European policing and security agencies said the fallout from a ransomware attack that has already crippled more than 200,000 computers around the world could deepen as people return for another work week.
Around a fifth of NHS trusts were hit in the attack, forcing them to postpone operations and procedures over the weekend.
According to Xinhua, by Saturday night, 29,372 institutions had been infected along with hundreds of thousands of devices. Also affected were railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services. "The global reach is unprecedented", BBC quoted Wainwright as saying in an interview with Britain's ITV.
Wainwright described the cyberattack as an "escalating threat".
Krishna Chinthapalli, a neurology registrar at the National Hospital for Neurology and Neurosurgery in London, had said an increasing number of hospitals could be shut down by ransomeware attacks in an article on the vulnerability of the NHS network in the British Medical Journal on Wednesday, two days before the major cyber hack of the National Health Service (NHS) system.
Senior security staff held another meeting in the White House Situation Room on Saturday, and the Federal Bureau of Investigation and National Security Agency were trying to identify the perpetrators of the massive cyber attack, said the official, who spoke on condition of anonymity, stated Reuters.
"(There have been) remarkably few payments so far that we've noticed as we are tracking this, so most people are not paying this, so there isn't a lot of money being made by criminal organizations so far", he said.
He added: "The trust's security measures that we have got in place are stable and still holding firm".
A hacking group called Shadow Brokers released the malware in April, claiming to have discovered the flaw from the NSA, Kaspersky said.
The computing giant said software vulnerabilities hoarded by governments had caused "widespread damage", the BBC reported.
In a post on Microsoft's blog, Smith says: "An equivalent scenario with conventional weapons would be the U.S military having some of its Tomahawk missiles stolen".
Though the ransomware continued to spread at a more subdued pace on Monday, many companies and government agencies were still struggling to recover from the first attack.
NZ cyber security officials say they'll be staying vigilant with the working week starting tomorrow.
The ransomware attack utilized a virus called WannaCry that blocked users from accessing data on affected systems.
Despite many computer and telephone systems still being affected by the malware, all GP practices will be open as usual today, the trust said, but patients have been asked not to try and make a new appointment - by phone or in person - "unless it is vital".