Remote vendor connections make the healthcare attack surface much bigger, so they need to be tightly controlled. Research indicates that unmonitored or excessively privileged vendor accounts often facilitate data breaches. Specifically, an Applied Clinical Informatics survey of healthcare delivery organizations found that 56.4% reported a breach involving third-party network access in the previous 12 months, and 54.3% of those data breaches or cyberattacks were thought to result from a third party having too much privileged access. A business associate agreement (BAA) only gives legal protection, not active security controls. Covered entities should ask for stronger protections than standard BAAs.
Organizations should use least-privilege policies and constant monitoring to limit vendor access without getting in the way of care. Paubox's encrypted email platform automatically protects protected health information (PHI) while it's being sent and works perfectly with existing workflows, allowing vendors to work together safely without slowing down healthcare operations.
Remote access expands the attack surface
Allowing vendors to connect from afar effectively expands the network's perimeter into areas that are not under control, making it more vulnerable. The HHS strongly warns in Security Guidance that offsite access to ePHI requires “extreme caution” and rigorous controls. A lot of vendors use VPNs or remote desktop tools, which hackers often go after.
Remote vendor systems might not have enterprise security patches or VPN protections. This means that if a vendor device is hacked, for example, by malware or stolen credentials, attackers can get right into the hospital's systems. An intruder can hide out of sight during remote sessions because they are harder to watch.
Each remote connection by a vendor is a potential entry point; without strong multifactor authentication, endpoint security, and network segmentation, vendors’ home or corporate networks greatly raise breach risk.
Over-permissioned accounts create easy paths for attackers
The Applied Clinical Informatics study on healthcare third-party access explains, “But providing such access creates risks. Cyber-attacks commonly involve privileged account compromise.”
When a vendor's account has more rights than it needs or is not regularly checked, the chance of losing data goes up a lot. The respondents found that only 51.1% had a comprehensive inventory of all third parties with network access, while 60% said third parties with access to confidential information were not routinely monitored. Excess privileges provides external entities with broader access to necessary systems. Attackers who break into a vendor account that has too many permissions can move laterally, getting access to patient records and administrative functions that the vendor does not need. The consequences are not theoretical: the study found that breach outcomes included loss or theft of sensitive information in 60% of cases, regulatory fines in 49%, severed third-party relationships in 47%, and loss of revenue in 42%.
A malicious action or error by a vendor often goes unnoticed until a breach occurs. The study found that 53% of organizations that monitor third-party access do so manually, while 53% also cited a lack of oversight or governance as a barrier to reducing third-party and privileged access risk. Not enforcing strict least privilege on vendor accounts and not monitoring them regularly can lead to lost data, fines, and a loss of trust from patients.
BAAs do not replace access controls
A BAA is a legal contract, not an active security control. HIPAA requires covered entities to have BAAs with their vendors, but guidance makes clear that BAAs alone cannot substitute for strong defenses. NIST guidance on HIPAA notes that while BAAs must include safeguards, covered entities “are permitted to require more stringent cybersecurity requirements” than the HIPAA minimum.
BAAs establish obligations (e.g., encryption, breach notification), but they do not guarantee the vendor is following them. A signed BAA will not prevent a hacker from exploiting a misconfigured vendor system. Indeed, OCR enforcement actions show that even with a BAA in place, healthcare entities can be penalized if they fail to verify vendor security.
A BAA is only the baseline; actual risk reduction comes from implementing technical measures (strong authentication, logging, segmentation) beyond the contractual terms. Without those controls, satisfactory assurances on paper cannot stop an attack, a vendor might still mishandle PHI or be breached, and the covered entity would suffer the breach fallout despite the BAA.
How to limit vendor access without slowing care
Enforcing the principle of least privilege for vendors is critical; limiting each vendor’s account to only the functions they need has been shown to reduce third-party and fourth-party risks. Technology aids this effort. For example, Paubox provides seamless HIPAA compliant email and communication tools so PHI can be shared with vendors without introducing new portals or delays.
Paubox automatically encrypts every outbound message and delivers it directly to recipients’ regular inboxes, eliminating extra login steps. It also integrates with major platforms (Google Workspace, Microsoft 365, etc.), meaning vendors use familiar workflows while PHI remains encrypted.
FAQs
Are business associates directly liable under HIPAA?
Yes. HHS OCR explains that business associates are directly liable for certain HIPAA violations.
Does a business associate need agreements with its subcontractors?
Yes. A business associate must ensure that subcontractors with access to protected health information agree to the same restrictions and conditions that apply to the business associate.
Can a covered entity use a vendor without a BAA?
No, not when the vendor is acting as a business associate. Guidance says covered entities and business associates must enter into HIPAA compliant business associate contracts when the vendor will create, receive, maintain, or transmit PHI on their behalf.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
