Let’s say you’re a newly hired Third-Party Risk Analyst at a mid-sized healthcare company. During your onboarding, you realize that while they have dozens of vendors handling sensitive patient data (think billing companies, cloud services, and telehealth providers), they have no formal third-party risk assessments documented. First, you would start by building a basic Third-Party Inventory. You’d gather a list of all vendors, what services they provide, and what kind of data they have access to. You would focus on vendors that touch patient records (Protected Health Information, or PHI) because HIPAA requires stricter handling for that kind of data. Next, you would create a simple vendor risk rating system. For example, any vendor handling PHI = High Risk, vendors with financial data = Medium Risk, vendors with only public data = Low Risk. You’d organize vendors into those categories so leadership can prioritize attention. Then, you would prepare a basic Due Diligence Questionnaire to send out. It would ask things like: • Do you encrypt PHI data in transit and at rest? • Do you have a current SOC 2 report? • Have you had any breaches in the last 12 months? After collecting responses, you would review them and flag any vendors who seem high-risk (like no encryption, no audit reports, or recent breaches). You’d recommend follow-ups, like contract updates, requiring security improvements, or even switching providers if needed. Finally, you would propose setting up a recurring third-party review schedule — maybe every 6 or 12 months — so that vendor risk stays managed continuously, not just one time.
How to Safeguard Patient Data From Cyber Threats
Explore top LinkedIn content from expert professionals.
-
-
How to protect telehealth from cyberattacks. Telehealth expands access and attack surfaces. Here’s what every health tech leader should prioritize: 1. Secure Data Transmission →Are your video calls and patient records encrypted? →Without E2E encryption, data in transit is a target. 2. Multifactor Authentication →Is your login process secure? →Using MFA can block most attacks. 3. Software Updates →Outdated systems invite hackers in. →When was the last time your platform was patched? 4. Vendor Security Reviews →Your telemedicine platform relies on third-party tools. →Are your vendors handling security the same as you? 5. Proactive Threat Monitoring →How quickly can you detect and respond to threats? →Continuous monitoring is your ally. The cost of a cyberattack isn’t just financial... It’s patient trust, it's partner trust. And your reputation is on the line. Telemedicine is the future, but only if it’s secure. 𝗣.𝗦. Which of these do you think is the most important? Link[s] in profile: ↳ Join 𝟲𝟬𝟬+ in my Newsletter ↳ Grab a free 𝗛𝗜𝗣𝗔𝗔 𝗖𝗵𝗲𝗰𝗸𝗹𝗶𝘀𝘁 to get started
-
US Health Dept warns hospitals of hackers targeting IT help desks with tactics similar to scatteredSpider (MFA and AI voice) . Recommended mitigation: -Require callbacks to verify employees requesting password resets and new MFA devices. -Monitor for suspicious ACH changes. Revalidate all users with access to payer websites. -Consider in-person requests for sensitive matters. -Require supervisors to verify requests. -Train help desk staff to identify and report social engineering techniques and verify callers' identities. https://lnkd.in/g-6whjze
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development