Patient data is the crown jewel of cybercrime, rich in immutable personal details and endlessly exploitable. And while hospitals have come a long way in protecting this treasure trove, the digital front lines have shifted.
To a cybercriminal, a patient record isn’t just a file, it’s a goldmine. It includes everything from Social Security numbers to diagnostic results to insurance information. Health systems have responded admirably. Today’s hospitals are fortified with robust firewalls, endpoint detection, multifactor authentication, zero-trust policies, and constant vigilance. Many healthcare CIOs and CISOs now run some of the most sophisticated cybersecurity operations of any industry.
But even as health systems elevate their security posture, a critical threat still looms: third-party software applications.
Beyond the Firewall
The traditional model of cybersecurity focused on defending the organization’s internal systems, everything within the firewall. But that paradigm is now obsolete. Today, the health system’s cybersecurity ecosystem includes everything connected to its data, including applications and vendors far beyond its perimeter.
This evolving mindset has prompted forward-thinking leaders to reframe third-party application developers as part of their extended workforce. Engineers writing code for cloud-based EHR plug-ins, patient communication platforms, and billing systems are not just contractors, they are, in effect, outsourced employees of the health system. And like any employee, their cybersecurity hygiene matters.
If these developers are integrating outdated, insecure, or unmonitored software libraries into their products, then those vulnerabilities are already inside the hospital’s defenses, regardless of how strong the firewall is.
The Trojan Horse of Third-Party Apps
Recent breaches make this painfully clear.
In 2024, ransomware actors infiltrated PIH Health Hospitals’ systems via a third-party vendor, compromising data from over 17 million patients. The breach left systems frozen, delaying care and medication access. That same year, hackers exploited weak access controls in software used by Change Healthcare, exposing 145 million patient records and disrupting clinical operations across the country.
These aren’t isolated events. According to the 2024 Verizon Data Breach Investigations Report, software supply chain compromises accounted for 15% of all healthcare data breaches, up from just 4% in 2021. The trend is unmistakable: attackers are targeting the blind spots in the digital supply chain.
Software Supply Chains
Third-party apps are typically assembled from dozens of open-source and proprietary code libraries. These components, collectively called the Software Bill of Materials (SBOM), are rarely scrutinized by the hospitals that rely on the applications. But they should be.
Why? Because these reused code libraries often contain known vulnerabilities. Take the Log4Shell flaw in the ubiquitous Log4j library, which allowed attackers to execute remote code on affected systems. It remained hidden for years, embedded in countless enterprise and healthcare applications, before it exploded into public view in 2021.
Even when flaws are known, patching them is another matter. Hospitals are at the mercy of their vendors, some of whom delay fixes or fail to notify clients altogether. Worse, many vendors have no system for tracking the security status of the code libraries they use. That’s unacceptable in today’s cybersecurity environment.
Market Forces vs. Security Discipline
This systemic vulnerability is not a mystery, it’s a business reality.
Healthcare SaaS vendors are under constant pressure to ship new features, integrate AI tools, and stay ahead of competitors. Speed-to-market is prioritized over secure development. Shortcuts are made. Code is reused. Penetration testing is deprioritized. Patch cycles are slow. And since buyers tend to evaluate vendors based on features and cost, not software integrity, there’s little market incentive for change.
The regulatory environment hasn’t kept pace either. Unlike pharmaceuticals, where every compound is rigorously vetted, software often escapes serious scrutiny.
The Role of Health System Leaders
To their credit, many health system leaders are already rising to the challenge. They are embracing a broader, ecosystem-wide understanding of cybersecurity and holding vendors accountable.
One powerful tool in their arsenal: automated code monitoring platforms. These solutions continuously scan the code libraries inside third-party apps, flagging outdated or vulnerable components and alerting IT teams when new threats emerge. They turn the black box of a vendor’s software into a glass house, and give security teams a chance to act before attackers do.
This level of insight gives hospital IT leaders the power to ask hard questions of their vendors: What code libraries are in your application? Are they up to date? How quickly can you patch known vulnerabilities? Do you monitor your SBOM with automated tools?
The Challenge
Cybercriminals are no longer attacking the front gates, they’re slipping through the side doors, disguised as “trusted” software providers.
Health systems can no longer afford to draw a line between “us” and “them.” In the modern cybersecurity landscape, third-party engineers are part of the team, and subject to the same scrutiny. Their hygiene is your hygiene. Their code is your risk.
It’s time to bring these outsourced employees into the fold. Monitor their tools. Audit their practices. And make cybersecurity a shared responsibility across the full digital supply chain.
Because in today’s world, the hospital firewall is no longer the edge of the battlefield. It’s just the beginning.
