Introduction
February 21, 2024. Healthcare providers across the country woke up to discover their payment systems had stopped working. Prescription claims weren't processing. Insurance eligibility checks failed. Revenue quite literally froze. But the organizations affected hadn't been hacked. Their vendor had.
The Change Healthcare ransomware attack became the most devastating supply chain disruption in U.S. healthcare history. It affected 192.7 million patient records. It caused $6.3 billion in claims submissions to drop in just the first three weeks. And it proved what risk managers have been warning about for years: your organization's crisis readiness is only as strong as your weakest vendor.
Third-party breaches now account for 30% of all security incidents, double what they were just a year ago. With 98% of organizations reporting supply chain impacts in 2025 and regulators tightening expectations, the question isn't whether you'll face a vendor-driven crisis. It's whether you'll be ready when it happens.
The Change Healthcare Cascade: A Cautionary Tale
Change Healthcare processes 15 billion healthcare transactions annually. It touches one in three patient records in the United States. So when the BlackCat ransomware group encrypted its systems, the impact cascaded far beyond a single company. According to the American Hospital Association, 74% of hospitals reported direct patient care impact, including delays in authorizations for medically necessary care. A staggering 94% reported financial consequences. And 33% saw more than half of their revenue disrupted.
The attack exposed a critical vulnerability that exists across every industry: concentration risk. When hundreds or thousands of organizations depend on a single vendor for mission-critical functions, that vendor becomes a single point of failure for the entire ecosystem. An American Medical Association survey found 80% of physician practices lost revenue from unpaid claims. Many healthcare providers were forced to exhaust personal funds just to keep their doors open.
The aftermath continues to unfold. UnitedHealth Group estimates total costs will exceed $2.457 billion. The company paid a $22 million ransom, yet systems remained down for weeks. Some operations took nearly a year to fully restore. State attorneys general have filed lawsuits. The OCR launched HIPAA investigations. And healthcare organizations that had nothing to do with the breach are still dealing with the fallout.
Know Your Critical Vendors
Map which vendors would cause operational shutdown if they went offline for 24 hours, 72 hours, or two weeks. These are your highest-priority targets for crisis planning and redundancy analysis.
Third-Party Breaches Have Doubled
The Change Healthcare attack wasn't an outlier. It was the most visible example of a trend that's accelerating across every sector. According to the 2025 Verizon Data Breach Investigations Report, third-party involvement in breaches has doubled, rising from 15% to nearly 30% in just one year. SecurityScorecard's 2025 Global Third-Party Breach Report confirms the pattern: threat actors are prioritizing supply chain access for its scalability.
The economics favor attackers. Compromising a single trusted vendor can provide access to dozens or hundreds of downstream targets. Why spend resources attacking a well-defended Fortune 500 company directly when you can infiltrate through a smaller supplier with weaker security? The World Economic Forum's Global Cybersecurity Outlook 2025 identifies this gap in security maturity between large organizations and their suppliers as a primary driver of supply chain risk.
BlueVoyant's State of Supply Chain Defense Report 2025 found 98% of organizations have been negatively impacted by a cybersecurity breach in their supply chain, up from 81% the previous year. That's not a risk to plan for someday. That's a near certainty you'll face soon. And for each direct vendor relationship, organizations have indirect exposure to approximately 14 times more fourth and fifth-party providers. Those layers of risk remain largely invisible.
The Financial Reality
IBM's 2024 Cost of a Data Breach report puts the average third-party breach cost at $5.08 million. Supply chain attacks also take the longest to identify and contain, extending dwell time and compounding damages.
What Regulators Now Expect
The regulatory response to supply chain vulnerabilities has intensified. In June 2023, the Federal Reserve, FDIC, and OCC issued joint interagency guidance on third-party relationships that establishes comprehensive requirements for banks. The guidance spans the entire vendor lifecycle: due diligence before onboarding, ongoing monitoring during the relationship, and controlled exit procedures. It applies to relationships with any third party regardless of whether written contracts exist.
For credit unions, NCUA Letter 2007-13 and Supervisory Letter 07-01 remain the foundational documents, requiring evaluation of all third-party arrangements commensurate with size, complexity, and risk profile. The FFIEC IT Examination Handbook goes further, establishing that controls over outsourced activities must provide the same level of assurance as controls over activities performed in-house. The board of directors is held responsible for ensuring appropriate oversight. This isn't guidance. It's an examination standard.
The FFIEC framework addresses third-party risks as an enterprise-wide governance issue, not just a technology concern. Organizations must have mitigation strategies for foreign-based third-party providers, develop specific risk mitigation plans, and ensure contracts include the right to independent reviews and clear third-party responsibilities for addressing security risks. Non-compliance penalties can reach $2 million depending on the severity of findings.
Why Traditional Vendor Management Falls Short
Most organizations approach third-party risk through annual questionnaires and periodic assessments. SecurityScorecard's research shows 62% of organizations report that less than half of their vendors meet their company's cybersecurity requirements. Yet those same vendors remain in the supply chain because the assessment process is passive. It measures a point in time rather than providing continuous visibility. By the time you discover a vendor has a problem, you're often already affected.
EY's 2025 survey of 500 executives found that third-party risk management programs are fundamentally misaligned with the current environment. Operational risk topped concerns, followed by financial, cybersecurity, privacy, and regulatory risks. The number of business functions relying on third parties has increased dramatically as companies outsource everything from HR to business intelligence to supply chain logistics. But the processes to manage those relationships haven't kept pace.
The gap between SOC teams and third-party risk management teams compounds the problem. SOC teams report being overwhelmed, understaffed, and struggling with data overload. When a vendor incident occurs, the handoff between risk assessment and incident response breaks down. Vendors often don't respond to assessments, leaving security teams without the visibility they need. The result is that most organizations discover third-party compromises only after the damage spreads.
Building Crisis Response for Vendor Incidents
Vendor crisis response differs from responding to a direct attack. You have less information. You have less control. You depend on another organization's timeline and communication. But you still own the impact on your customers and operations. The first step is acknowledging that vendor incidents require their own category of playbooks, separate from internal incident response procedures.
Start with your most critical vendors, those whose outage would disrupt operations within 24 hours. For each, develop specific continuity procedures. What manual workarounds exist? Which alternative vendors are pre-qualified and ready to activate? Who makes the decision to switch, and what triggers that decision? Healthcare organizations that had backup clearinghouse relationships fared better during the Change Healthcare outage than those scrambling to onboard alternatives after systems went dark.
Communication during vendor incidents requires special handling. Your customers don't care whose fault the problem is. They care that you're addressing it. Prepare messaging templates that acknowledge the disruption without assigning blame prematurely. Establish escalation paths to vendor contacts who can provide status updates. And practice the coordination, because real incidents unfold faster than quarterly vendor review meetings.

When Systems Go Dark
The human impact of vendor incidents extends beyond technology to patient care and staff operations
Practical Steps for 2026
Conduct a concentration risk assessment. Identify vendors where a single provider handles significant volume of a critical function. Healthcare learned this lesson with Change Healthcare processing half of all medical claims. Credit unions should examine core processors, payment networks, and lending platforms. Franchises should evaluate POS providers, supply chain systems, and employee scheduling platforms. The vendors with the highest operational dependency need the most attention.
Build vendor incident playbooks before you need them. Document the specific actions your organization will take if a critical vendor goes offline. Include communication chains, manual workaround procedures, alternative vendor activation steps, and regulatory notification requirements. Test these playbooks with tabletop exercises that simulate vendor outages. The time to discover gaps in your plan is during a drill, not during an actual incident.
Push for contractual protections that support your response capabilities. Incident notification timeframes should be specified in hours, not days. Right-to-audit clauses enable verification of security claims. Requirements for business continuity and disaster recovery testing give you confidence in vendor resilience. And exit provisions ensure you can transition away from a vendor that fails to meet obligations without being held hostage.
Integrate third-party risk into your overall crisis management program. The same command center that activates for a direct attack should be capable of coordinating response to vendor incidents. Cross-functional teams should include procurement, legal, operations, and communications alongside security. When a vendor incident escalates, you need coordinated action across the organization, not silos trying to solve pieces of the puzzle independently.
Summary
The Change Healthcare attack proved that even organizations with strong internal security can find themselves paralyzed by a vendor's crisis. With third-party breaches doubling to 30% of all incidents and 98% of organizations reporting supply chain impacts, vendor risk has become an operational certainty rather than a theoretical concern. Regulators from the FFIEC to NCUA now hold organizations accountable for their entire vendor ecosystem. The path forward requires treating third-party incidents as a distinct category of crisis, with dedicated playbooks, tested workarounds, and integrated response capabilities. Organizations that prepare now will maintain operations when their vendors falter. Those that wait will learn, as healthcare providers learned in February 2024, just how quickly someone else's problem becomes their own.
Key Things to Remember
- ✓Third-party breaches have doubled to 30% of all security incidents, with 98% of organizations reporting supply chain impacts in 2025
- ✓The Change Healthcare attack affected 192.7 million patient records and cost over $2.457 billion, proving the devastating cascade effect of vendor incidents
- ✓Regulators including FFIEC, NCUA, and interagency guidance now require comprehensive third-party risk management with board-level accountability
- ✓Organizations need dedicated vendor incident playbooks separate from internal response procedures, with tested workarounds and pre-qualified alternatives
- ✓Integration of third-party risk into overall crisis management enables coordinated cross-functional response when vendor incidents escalate
How Branchly Can Help
Branchly helps multi-location organizations build vendor incident playbooks before crises occur. The platform identifies critical vendor dependencies across your operations, generates response procedures for third-party outages, and coordinates cross-functional response when vendor incidents affect your locations. Pre-approved communication templates address customer concerns without requiring legal review during the heat of an incident. And the centralized command center tracks impact across all locations, ensuring consistent response whether one branch or one hundred are affected by a vendor's crisis.
Citations & References
- [1]Change Healthcare Cyberattack Underscores Urgent Need to Strengthen Cyber Preparedness American Hospital Association View source ↗
- [2]
- [3]
- [4]Third-party breaches double, creating ripple effects across industries Help Net Security View source ↗
- [5]
