Guest blog by William Ahrens, Director, Mazars USA
HITRUST assessments can be used to reduce the risk of a data breach, achieve cost savings, and avoid threats. An especially compelling use case is for organizations to use the HITRUST framework to assess their third parties.
Data breaches caused by third-party vendors and suppliers have been a significant concern for organizations in recent years due to the complex nature of modern business operations. As it becomes more common for organizations across industries to outsource greater numbers of services, third-party risks are compounded.
IBM’s Cost of a Data Breach Report 2022 stated that a compromise at a third party or a business partner caused 19% of breaches. The report also explored the impact various factors had on the average cost of a data breach. While the presence of AI, DevSecOps, and Incident Response had positive impacts on lowering costs, compliance failures and the involvement of third parties inflated the costs. In fact, these two were among the highest contributing factors. When organizations can quickly detect a breach and shorten its lifecycle, they can significantly reduce costs and save as much as $1.12 million.
The potential for risk caused by third parties is especially high for hospitals and healthcare organizations due to their interconnected systems and multiple entry points for data access, which increase their attack surfaces and potential vulnerabilities. Healthcare organizations outsource critical processes that give access to PHI and other sensitive data. This makes it essential to reduce third-party risks with practical solutions that provide reliable assurances and greater insights into security practices.
But where to start? Vendors are a diverse group. They range substantially in size, service offering, capability, risk profile, and cyber maturity. It’s no wonder most organizations — especially those in healthcare — struggle with vendor risk management.
Manual, inconsistent approaches are time- and resource-intensive, overtaxing assigned staff with limited bandwidths and competing priorities. Given the large number of third parties, staff members strain to keep up with the high volume of assessments.
To effectively address security requirements that are appropriate for each vendor, companies should consider employing a risk-tiering strategy. Vendor risk management programs with a consistent and structured risk analysis process allow organizations to assess vendors based on the risk they present to the business.
Organizations can select the appropriate level of security assurance for each vendor by considering the following.
Realizing the need, HITRUST offers three certification options to address varying assurance requirements, risk maturity, and business profiles of vendors.
The foundation of HITRUST certifications is its framework, the HITRUST CSF. The HITRUST CSF offers many unique benefits not found within other compliance frameworks.
HITRUST assessments provide transparent reporting of the assessed vendor’s security practices. Unlike other frameworks, HITRUST is prescriptive. With its suite of products and services, HITRUST offers the most comprehensive assurance mechanism and provides an efficient and tiered vendor risk management methodology.