Five months on, and EU health workers can’t bear to contemplate a second Covid-19 wave | The Guardian

When the Guardian spoke to staff in March they had no time for reflection. So what do they think of the new surge now? Coronavirus – latest updatesSee all our coronavirus coverageDuring the initial peak of Spain’s Covid-19 pandemic in the spring, the virus displayed an unexpected mercy. In its spread, ferocity and awful novelty, it left health workers too tired and overwhelmed to look beyond the next few hours.“There’s no time to get angry or to wonder why things have been organised the way they have been,” Sara Gayoso, an A&E doctor at El Escorial hospital near Madrid, told the Guardian at the end of March. Continue reading…

When the Guardian spoke to staff in March they had no time for reflection. So what do they think of the new surge now?

During the initial peak of Spain’s Covid-19 pandemic in the spring, the virus displayed an unexpected mercy. In its spread, ferocity and awful novelty, it left health workers too tired and overwhelmed to look beyond the next few hours.

“There’s no time to get angry or to wonder why things have been organised the way they have been,” Sara Gayoso, an A&E doctor at El Escorial hospital near Madrid, told the Guardian at the end of March.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more