As healthcare organizations outsource more products and services from various business associates and third-party vendors, it’s necessary to understand the different types of vendors and ways to identify and mitigate the cybersecurity risks that each vendor presents to your organization. Before you can introduce a product or service into your organization, you need to properly vet your vendors and ensure that their security posture meets your risk tolerance.
Recent news of cyberattacks has highlighted the importance of vetting and monitoring your vendors’ security posture, or risk becoming the victim of a third-party data breach. For healthcare organizations, maintaining patient privacy is key.
However, when you trust your vendors to protect your sensitive data, you expose your organization to severe risks. The fact of the matter is that you don’t have control over your vendor’s security controls, so before you purchase a service or integrate a product into your organization, you need to perform a thorough vetting process to ensure that your vendor can defend your information.
Third Parties: As healthcare organizations continue to rely on third parties for key products and services, the vetting process is a must. You need to have a full picture of what your vendor’s controls are and how they will handle your information. How and why is your data accessed? Who will have access? These are all important questions to consider when vetting your third party’s security controls.
Managed Service Providers: When outsourcing products and services, many healthcare organizations turn to Managed Service Providers (MSPs), which are hired to perform a type of managed service on behalf of the organization. A few examples of MSPs include cloud service providers, patient portals, and laboratory or medical testing.
Fourth Parties: When dealing with your supply chain, you need to also consider your vendor’s vendors, also called fourth parties. It’s important to understand that your fourth parties may provide essential services for your vendors, which affects your organization as well. In certain cases, your fourth parties may even have contact with or access to your sensitive data, so they need to be held accountable and properly vetted for their security posture and compliance. For example, if PHI is involved, fourth parties are held accountable to HIPAA regulations.
Offshore Vendors: Offshore third parties include any vendors whose main operations or a branch of their operations are not located on U.S. soil. Depending on where the offshore provider is located, there may be additional risk in the relationship. Attackers are more active in certain countries, so it’s important to know at which offshore locations a vendor will maintain operations that access, transmit, or store your patient data. If it’s in a location heavily targeted by attackers, extra security controls will need to be implemented.
Independent Contractors: Independent contractors provide specific services or deliverables to your organization and can pose security risks when working remotely or without the proper security measures in place. In these instances, your organization may require the contractor to perform their work on a Virtual Desktop Infrastructure (VDI). A VDI ensures that all work performed is done on your network and stays on your network. However, these outsourced vendors need to undergo vendor vetting as well to ensure they maintain proper security controls for your independent contractors.
Outsourced vendors can be key to the success of your organization and to the quality of care you provide your patients. However, a lack of security controls can present great risks to your organization, which you can identify during the vetting process.
Here are several key areas of security and data protection that need to be addressed when vetting an outsourced vendor:
Vetting your vendors is essential to identifying and managing cybersecurity risks that threaten your organization and your patients. Your team should work to gain as much transparency into your vendors’ security practices as possible before signing a contract and exposing your sensitive information to potential threats.