Aug 26, 2019
Oct 25, 2025
Black Kite
The data breach experienced by American Medical Collection Agency (AMCA), a third-party bill-collection vendor for the health institutions, affected 17 health institutions including the United States’ biggest lab testing companies, Quest and LabCorps. The incident came to light in early June.
Hackers exploited a vulnerability in AMCA’s web payment portal, the company’s database filled with customer’s personal and payment information. Overall, more than 24 million customers were affected. Attackers gained access to sensitive patient information including names, addresses, phone numbers, dates of birth, dates of service, balance information, payment card or banking information, social security numbers, and personally identifiable medical information.
The healthcare industry requires many types of third-party service providers and vendors, especially those related to information technology and management. Health insurance companies, medical equipment suppliers, imaging centers, marketing companies, data-management companies, and website/email providers are all potential third parties for the healthcare industry.
The healthcare industry is constantly under attack due to the valuable sensitive information recorded by providers. Attackers can find a pivot point into a healthcare provider’s systems through these third parties, gaining access to sensitive data. Black Kite examined more than 40 major data breaches that occurred in 2017 and showed that third-party vendors are the second most frequent reason behind a breach after phishing attacks. Some of the recent data breaches caused by a third-party in the healthcare industry are:
Regulations such as The Health Insurance Portability and Accountability Act (HIPAA), The Payment Card Industry Data Security Standard (PCI DSS), and Europe Union General Data Protection Regulation (GDPR) hold companies responsible for exposures of personal data. Most of these regulations and federal laws consider organizations accountable even if the data breach was caused by a third-party. The Health Insurance Portability and Accountability Act (HIPAA) is not an exception.
HIPAA aims to protect the health-related and personal information of individuals, including medical records, health insurance data, and patient social security numbers. This type of personal information holds a high value, being profitable in the black market of the dark web. Every year hacking incidents increases and pose a significant cyber risk to healthcare providers [1].
Many healthcare providers and health plans (covered entities) know the consequences of not following guidelines set by HIPAA rules, and consequently, they work hard to comply by protecting data as much as possible. However, some don’t know that their third parties (business associates, partners, subcontractors) should also meet the same HIPAA regulations. As an example, patients’ data is given to a research company (a business associate) and the research company engages a data-management firm (a subcontractor) for data storage. Both the research company as a business associate and data-management firm as a subcontractor must abide by the same HIPAA rules as the healthcare providers and health plans (the outsourcers).
The HIPAA Omnibus Rule of January 2013 set some ground rules for Business associates of covered entities. In part, those associates must:
A covered entity may disclose protected health information (PHI) to a business associate under a written contract that includes certain (specific) assurances to comply with stated sections of the rule. This type of arrangement may also be applied by the business associate to its own subcontractors that require access to PHI data.
Healthcare providers should monitor and assess the cyber risk of their third parties and understand the level of HIPAA compliance required of a third-party vendors. One healthcare provider may have hundreds of vendors and suppliers and any number of those third parties may not be familiar with HIPAA rules.
Black Kite Cyber Risk Scorecard is a security rating tool that helps healthcare providers with this difficult task. The Scorecard provides easy-to-understand risk scores for a company and the ecosystem formed by its third parties. This tool is useful for healthcare providers during both the procurement phase and in ongoing due diligence processes because it provides an understanding of the potential for risk with the third party company. By utilizing the Scorecard to identify known risks, the third-party can correct these issues and provide greater protection for their client data.
Black Kite also provides compliance reports for many national and international standards including HIPAA rules. Once a healthcare provider submits a listing of its third-parties’ domain names, the Cyber Risk Scorecard is developed by conducting a non-intrusive examination of the digital footprint of those providers across the web. Black Kite’s Cyber Risk Scorecard assesses the cyber risk posed by those service provider relationships; and provides an estimate quantifying/ranking the level of compliance assurance of each provider. The Scorecard is based on publicly available, cyberspace information. Healthcare providers can supplement the Scorecard by sharing it with their third-party, allowing the third-party to identify any security gaps or concerns that might be identified through the Scorecard.
Healthcare service providers and other vendors do not always know what they need to do to meet HIPAA rules, even if they serve in the healthcare field. A vendor may be more familiar with regulations other than HIPAA. For instance, a vendor that deals with credit card transactions may be more familiar with PCS-DSS, and a vendor that processes EU citizens data may be more familiar with GDPR. Thus, some vendors may not understand HIPAA requirements. Fortunately, Black Kite offers cross-walking between regulations and frameworks, making the task of tracking and meeting requirements easier for both healthcare providers and their third-parties.
Black Kite can also correlate information provided by third-parties to their customers (the outsourcers) on other regulations, such as NIST 800-53, PCI-DSS, ISO 27001, COBIT, and GDPR. This information can be used to estimate the level of compliance with HIPAA for a given vendor.
Act now and learn more about your company and it third-parties here.
[1] https://www.hipaajournal.com/healthcare-data-breach-statistics/