October 31, 2016 By Douglas Bonderud 3 min read

When donors finish giving blood, they’re often handed some sweet treats, like cookies or juice, to help get them back to full strength. But for the Australian Red Cross, the end of October 2016 comes with not-so-funny tricks along with those treats. According to CSO Online, the service was recently notified that registration data of more than 550,000 individuals was compromised thanks to third-party error.

One of the biggest cybersecurity issues in the history of Australian health care, the Red Cross donor breach showcased the persistent problem with third-party vendors — unfettered access. But how do companies stay safe in a world where internal IT can’t do it all?

At an Arm’s Length

Ideally, the relationship between health services and third-party IT contractors should be a combination of familiarity and distance. Providers need enough information and access to do their jobs, but they should also be kept at arm’s length from potential areas of compromise.

In the case of the Australian Red Cross, problems occurred when an employee working with the web developer that handles the agency’s Blood Service website accidentally left a 1.74 GB file sitting in an unsecure environment. Preliminary investigations suggested the data was potentially accessible on the site from Sept. 5 to Oct. 25 of this year. If a seemingly white hat hacker hadn’t contacted a reputable security researcher, the Red Cross donor breach could have gone completely unnoticed.

As noted by The Guardian, the incident came to light when an anonymous Twitter user sent security expert Troy Hunt a message that read, “Here’s your personal data.” The message was quickly followed by some of Hunt’s details, including full name, email, phone number and date of birth — all pieces of information he entered into an online Red Cross donation form.

Hunt convinced his contact to send over the entire file and delete the initial copy. He then contacted Australia’s Computer Emergency Response Team (AusCERT), which notified the Red Cross.

The final tally: 550,000 records, many containing detailed personal histories, were left completely unsecured on a website backup database. Even more worrisome, the agency has no idea how many people have accessed the data, have copies of the data or plan to use the data for personal gain.

Red Cross Donor Breach Highlights Third-Party Risk

While the Australian Red Cross donor breach raises red flags for the agency, this has become a common concern for American health organizations as well. As noted by Dark Reading, the health care industry has suffered approximately $6.2 billion worth of data breaches over the last two years. In fact, Cyber Scoop reported that almost 250,000 medical records were breached just last month.

Efforts are underway to limit the risks of health breaches, often through increased employee training and better data handling practices. According to a recent Ponemon Institute survey, however, third-party threats are also a critical factor. Almost half of respondents said they had experienced a vendor-caused data breach, and 16 percent were “unsure,” often because third parties did not report this information.

Even with Business Associate Agreements and the specter of Health Insurance Portability and Accountability Act (HIPAA) compliance, small mistakes by third parties can cause big problems. For the Red Cross, all it took was one developer accidentally leaving backup servers accessible on the public-facing website to compromise half a million records.

Juice and Cookies

The solution boils down to access and control. Vendors need specific permissions to complete assigned tasks and nothing else, even if it makes the job easier down the line. In addition, companies must vet the work of third parties after completion to ensure nothing is left open to the public that should be kept private.

It’s an extra step and another inconvenience for health agencies, but it is both necessary and beneficial. Think of it like the juice and cookies after a blood donation — enough time and oversight ensures no system walks away at risk.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today