Treffer: Third-Party Access Cybersecurity Threats and Precautions: A Survey of Healthcare Delivery Organizations.

Title:
Third-Party Access Cybersecurity Threats and Precautions: A Survey of Healthcare Delivery Organizations.
Authors:
Gellert GA; San Antonio, Texas, United States., Borgasano D; Imprivata Inc, Lexington, Massachusetts, United States., Palermo R; Imprivata Inc, Lexington, Massachusetts, United States., Gellert GL; San Antonio, Texas, United States., Kelly SP; Imprivata Inc, Lexington, Massachusetts, United States.
Source:
Applied clinical informatics [Appl Clin Inform] 2025 Oct; Vol. 16 (5), pp. 1518-1530. Date of Electronic Publication: 2025 Oct 30.
Publication Type:
Journal Article
Language:
English
Journal Info:
Publisher: Thieme Country of Publication: Germany NLM ID: 101537732 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1869-0327 (Electronic) Linking ISSN: 18690327 NLM ISO Abbreviation: Appl Clin Inform Subsets: MEDLINE
Imprint Name(s):
Publication: 2018- : Stuttgart, Germany : Thieme
Original Publication: Hölderlinstr, Germany : Schattauer
References:
J Med Internet Res. 2024 May 31;26:e46904. (PMID: 38820579)
Geneva Pap Risk Insur Issues Pract. 2022;47(3):698-736. (PMID: 35194352)
BMC Med Inform Decis Mak. 2020 Jul 3;20(1):146. (PMID: 32620167)
Appl Clin Inform. 2021 Aug;12(4):924-932. (PMID: 34587638)
Appl Clin Inform. 2024 Oct;15(5):921-927. (PMID: 39505007)
Entry Date(s):
Date Created: 20251030 Date Completed: 20251030 Latest Revision: 20251103
Update Code:
20251103
PubMed Central ID:
PMC12575072
DOI:
10.1055/a-2713-5725
PMID:
41167596
Database:
MEDLINE

Weitere Informationen

Gather insights regarding the state of third-party access cybersecurity in healthcare delivery organizations (HDOs).An online multinational survey was deployed to eligible respondents to assess HDO third-party access, cybersecurity, and challenges.Of 209 respondents, only 51.1% reported having a comprehensive inventory of all third parties accessing their network. Sixty percent stated third-party access to sensitive/confidential information was not routinely monitored, despite 19% having more than 40, and 31% having 21 to 40 third parties with network access. Reasons included lack of resources (48%) and centralized control over third-party relationships (36%), complexity (28%), and frequent third-party turnover (22%). Confidence in third-party ability to secure information and their reputations was cited. More than half (56%) reported a breach involving a third party in the last 12 months, and two-thirds anticipate breaches increasing in the next 12 to 24 months. Most agreed breaches are a cybersecurity priority, a resource drain, and their weakest attack surface. Slight majorities indicated high perceived effectiveness in mitigating, detecting, preventing, and controlling third-party access risks and security/privacy regulatory compliance. Regarding existing solutions, roughly half (55%) ranked the effectiveness of vendor privileged access management (VPAM) and privileged access management (PAM; 49%) at ≤ 6 on a 10-point scale, respectively. Barriers to reducing access risks include lack of oversight/governance (53%) and insufficient resources (45%). Of those monitoring third-party access, 53% do so manually. Breach consequences include loss/theft of sensitive information (60%), regulatory fines (49%), severed relationships with third parties (47%), and loss of revenue (42%) and business partners (38%).HDOs recognize the increasing threat of third-party cyber breaches but are struggling to effectively address them. Lack of budget, expert resources, complexity, and third-party turnover are among the reasons why. Need exists for automated, cost-effective solutions to address the significant risks of third-party access with a consistent strategy that minimizes breach risk by securing remote access to privileged assets, accounts, and data.
(The Author(s). This is an open access article published by Thieme under the terms of the Creative Commons Attribution License, permitting unrestricted use, distribution, and reproduction so long as the original work is properly cited. (https://creativecommons.org/licenses/by/4.0/).)

G.A.G. and G.L.G. are medical advisors to Imprivata, and D.B., R.P., and S.P.K. are employees of Imprivata.