BlogCybersecurity
Security questionnaire overload? Know your options.
5 Minute Read
Read Security questionnaire overload? Know your options.Cybersecurity
By CORL Technologies | June 21, 2021
Cyberattacks on the supply chain have been growing exponentially in the last several years. These attacks had introduced substantial social and political implications, as we saw with the recent attack against the Colonial Pipeline [1] that disrupted the supply of oil and gas for the southeastern U.S. region.
Healthcare has been hit the hardest of all industry segments at a time when we need to be firing on all cylinders to address and recover from a global pandemic. The supply chain attacks, in particular, have a greater impact to healthcare entities due to our increased dependency on third-party solutions to provide core capabilities for the care, treatment, and administration of healthcare delivery.
Supply chain breaches began as a threat to patient data and confidentiality, and have now evolved into events that put patient safety and operations routinely at risk. Healthcare’s dependency on cloud-hosted solutions to support its movement to digital healthcare models have exacerbated the matter.
Regulators like OCR are also shifting focus to the management of third-party risks for covered entities and business associates alike.
A new report from the Identity Theft Research Center (ITRC) cites healthcare as the industry sector with the highest volume of breach events in the past two years. [2]
The ITRC report notes a 42 percent rise in the number of supply chain attacks. This includes supply chain attacks at 27 third-party vendors in Q1 2021, including global IT provider Accellion, which impacted 137 US organizations and 7 million individuals (more on that breach is provided below). For some context on trending of attacks, there were 19 supply chain attacks in Q4 2020.
Healthcare has been grappling with an incessant pounding of supply chain attacks. Some of the more notable attacks impacting healthcare specifically in the last year include:
Third-party software weaknesses are also a leading source of ransomware infection from Russian malware agents according to the CISA. [3] Some of the top third-party software exploits used to introduce malware into healthcare entities include:
In order to combat these growing supply chain risks, CORL has developed a proprietary data clearinghouse that provides with access to assessment results of over 79,000 vendor assessments CORL has conducted. Each year, CORL conducts thousands more vendor risk assessments on behalf of our clients. Chances are very high that we have already assessed a substantial portion of your existing and new vendors from a security, risk, and compliance perspective.
CORL’s tech-enabled managed services and next generation exchange of vendor risk data allows healthcare entities to:
Contact our team here at CORL to learn more about our managed services and next generation exchange for healthcare vendor risk data that gets results with regulatory compliance and lowers supply chain risks.
[1] Cyberattack Forces a Shutdown of a Top U.S. Pipeline
[2] Data Breach Resources to Help Make Better Decisions | Trend Analysis
[3] Russian SVR Targets U.S. and Allied Networks
CORL Technologies
CORL transforms TPRM chaos into clarity
CORL is a leading provider of vendor risk management solutions for the healthcare industry. CORL gets results by scaling organizational and vendor risk programs through our healthcare vendor risk clearinghouse solution, dashboard reporting that business owners can understand, and proven workflows that drive measurable risk reduction. CORL accelerates the speed of vendor risk assessments and holds vendors accountable for remediating risk exposures.
Related Posts
BlogCybersecurity
By CORL Technologies | August 9, 2024
5 Minute Read
Read Security questionnaire overload? Know your options.BlogTPRM
By CORL Technologies | June 19, 2024
5 Minute Read
Read Essential Guide for Vendors: Key Features to Look for in a Cyber Security Assessment Tool for Healthcare TPRMBlogCybersecurity
By CORL Technologies | February 12, 2024
3 Minute Read
Read Do You Understand Your Vendors’ SOC 2 Reports?Webinars
WEBINAR A High-Velocity Approach to TPRM When healthcare organizations think of TPRM, the last thing they think of is ‘fast.’ Instead, today’s approaches to TPRM are exceedingly resource-intensive, expensive, ineffective, and slow. The laggard pace of TPRM is a stark contrast to the rapid pace of innovation in healthcare, which is essential to powering new […]