I didn't see the programme, but...
Several months ago the NSA was compromised and their cyber attack/intelligence tools were stolen. The hacking group behind it tried to sell these tools on the black market, but failed, so starting releasing the code on the web at various intervals. The set of tools released a couple of months back had the capability to compromise many common operating systems, including Windows, Linux, Solaris etc... ...which pretty much means virtually all internet servers, and most PCs.
The script kiddies then trivially bundled a few of these, and (its believed) targeted IT and communication companies, with some success (not that media would care about that). Unfortunatley, the NHS staff are easy targets, and it's fairly easy to social engineer them. Once inside various parts of the organisation, game over. Obviously, British media, wank themselves senseless that it happened to the NHS.
As to the OP, yes, other "devices" rather than traditional computers/servers, are frequently hacked. The biggest botnets are currently the cheapo CCTV cameras that consumers or small businesses buy. These sorts of devices need patching regularly, but nobody ever does, and hackers know that. With the much hyped IoT, this will get so much worse

About 5yrs ago there was a major flaw found in a whole host of Siemens controllers, used in everything from factory HVAC to nuclear power stations (allegedly). I bet the majority of those haven't been patched. Again, this was a flaw actively exploited by and alleged Middle East government agency.
Too many people have always stuck with that 20+ year old mentality of you can protect yourself by protecting the perimeter of your network. As any security expert will have told you in the last 15yrs, this is no longer a viable solution - and the NHS learnt the hard way. Although the perimeter is now less definable, due to wireless technologies built into devices, the easiest way to get into a network is the gullibility of the staff inside that network.