Attackers can’t breach data that doesn’t exist. If a supplier keeps data any longer than necessary to complete their contracted work, that data represents a 100% pure risk. Some suppliers retain data for their own purposes, like analytics, or even resale.For example, in January 2025, Change Healthcare disclosed that billing, claims, and payment information, such as claim numbers, account numbers, billing codes, and in some cases, payment cards, had been breached earlier in the year, potentially affecting up to 190 million individuals across the U.S. Why should a supplier need to store such purely transactional data after a transaction finishes?Healthcare companies need to ask the following questions:
Cyber breaches are expensive, and downtime represents even more costs. A supplier that can’t resume operations quickly after a ransomware or security incident can cause cascading delays and disruptions for the healthcare organization’s constituents.For example, a 2024 survey of healthcare organizations found that only 22% were able to recover operations in less than a week after a ransomware attack, and 37% said it took more than a month. Could any company last a month without one of its critical suppliers? And just as important, how can the healthcare organization make sure that all its data will be there after the recovery?Ask suppliers these questions:
Many healthcare data companies carry a third-party certification such as HITRUST or SOC 2 Type 2. Constituents must rely on these reports with care. Some suppliers try to pass off audits that cover only parts of their services. Others may withhold detailed audit results from customers.I’ve had suppliers send me audit reports that cover their infrastructure and shared services, but say nothing about the actual applications we use. Others have sent me one-page certification letters with no details about their controls or any audit findings. Needless to say, neither of those meets our supplier risk management standards.Insist on the full audit report, and then ask:
Companies that don’t have a formal supplier risk management policy and process, should make one right away. Show senior leadership these examples of how risky suppliers can damage the business and make the case that every new supplier must go through security review before signing a contract.Then, follow through. Use these questions for due diligence on every supplier that will receive the organization’s sensitive data. Any supplier worth its salt should be able to answer clearly and convincingly. Companies that ask these questions up front will weed out risky suppliers and greatly reduce their operational, reputational, and regulatory risks.Robert A. Eikel, privacy officer and CISO, P-n-T Data Corp.SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.