top of page
Search

Hertz Data Breach

  • Writer: Katarzyna  Celińska
    Katarzyna Celińska
  • Apr 28
  • 2 min read

On April 19, 2024, Hertz disclosed a data breach tied to its third party service provider, Cleo Communications, which exposed personally identifiable information of customers—including driver’s license numbers, contact details, and financial data. The incident, detailed in Hertz’s official notice, underscores a persistent and escalating issue: the fragility of the third-party ecosystem in data protection and operational continuity.

 

Cleo Communications—a file transfer service used by Hertz—experienced unauthorized access to its systems. Although the breach occurred outside Hertz’s core environment, the impact was direct and widespread, with customer trust, data privacy, and regulatory exposure all at stake.

 

As digital ecosystems grow more interconnected, vendors, subcontractors, and cloud platforms become high-value targets. A single weak link can cascade into full-scale operational or reputational damage.

 


ree

This breach perfectly illustrates why Third-Party Risk Management must be treated as a strategic pillar—not just a compliance function. In my recent presentations and research, I emphasize that TPRM failures are rarely about a single control gap—they’re about systemic oversight breakdowns in supply chain governance, assurance, and monitoring.

 

Here’s what organizations should be doing now to strengthen their TPRM programs:

Map Supply Chain Dependencies

Know who your vendors are, what systems they access, and how their failures impact your operations.


Categorize Vendors by Risk Level

Don’t treat all third parties the same. Tailor security and privacy expectations based on service criticality.


Demand Evidence-Based Assessments

Don’t rely on checkbox surveys. Require up-to-date SOC2 reports, ISO mappings, and verifiable control implementation proof.


Mandate Continuous Monitoring

Risk doesn’t stop after onboarding. Regular reassessments, audits, and security control validation are essential—especially with critical vendors.


Integrate Specific Security, Continuity & Privacy Clauses into Contracts

Contracts should specify mandatory controls, breach notification windows, right-to-audit provisions, and penalties for non-compliance.


Leverage Frameworks Like DORA, NIS2, and GDPR

These regulatory frameworks already define supply chain requirements—embed them into your TPRM lifecycle.


Ensure Auditability Across Your Supply Chain

Whether through internal audit, third party assessment, or runtime tooling—visibility is the only path to resilience.

 

A data breach caused by a third-party is still your breach. Security, privacy, and operational continuity must be owned collectively—and enforced contractually—across your ecosystem.



 
 
 

Comments


Stay in touch

BW ADVISORY sp. z o.o. 

ul. Boczańska 25
03-156 Warszawa
NIP: 525-281-83-52

Privacy policy

  • LinkedIn
  • Youtube
bottom of page