It is often said that cyber defenses are only as strong as the weakest link, which applies equally to individual organizations and to their supply chains. Headlines of breaches stemming from third and fourth parties routinely testify to the truth behind the adage. As a result, most healthcare organizations know the risks imposed by these “close encounters”. But what can be done about those risks?

