editorially independent. We may make money when you click on links
to our partners.
Learn More
Cognizant Technology Solutions is facing mounting legal pressure after a prolonged data breach at its healthcare subsidiary, TriZetto Provider Solutions (TPS), exposed sensitive personal information and went undetected for nearly a year.
Multiple class-action lawsuits now accuse the IT services giant of failing to protect data and delaying notification to affected individuals.
The company “… takes the protection of information very seriously and regrets any inconvenience this incident may have caused,” said a TriZetto spokesperson to CNBC-TV18.
Scope and Impact of the TriZetto Data Breach
The breach impacted individuals across multiple states, including Arizona and California.
The exposed data reportedly included Social Security numbers, financial account information, and home addresses.
While Cognizant has not publicly disclosed technical specifics, the lawsuits allege failures in basic security monitoring and incident detection.
Plaintiffs also argue that Cognizant and TriZetto failed to act quickly after discovering the breach, delaying notifications that could have allowed victims to mitigate harm.
The legal complaints further criticize the lack of transparency in Cognizant’s public disclosures, noting that the company did not clearly explain the breach’s root cause or outline specific remediation steps.
Why Stolen Personal Data Is So Dangerous
Social Security numbers and financial account data remain a valuable asset for cybercriminals.
Once compromised, this information can be reused for fraud, synthetic identity creation, and account takeover attacks. Unlike passwords, these personal identifiers cannot simply be reset.
Delayed notification compounds the problem. The lawsuits argue that affected individuals lost valuable time to freeze credit, monitor accounts, or take other defensive measures.
For regulated industries like healthcare, notification delays can also raise compliance concerns depending on applicable state and federal laws.
Limiting the Blast Radius of Security Incidents
Incidents like the TriZetto data breach underscore how quickly security gaps can escalate into prolonged exposure and legal risk.
While no single security control can prevent every attack, a combination of technical, procedural, and governance measures can help reduce risk and impact.
- Strengthen detection and monitoring through continuous logging, endpoint visibility, and anomaly detection to identify unauthorized activity earlier.
- Enforce strong identity and access controls by applying least privilege, eliminating shared accounts, and requiring multi-factor authentication for all sensitive systems.
- Reduce data exposure by encrypting sensitive information, minimizing data retention, and implementing data loss prevention controls.
- Harden third-party and vendor risk management with regular security assessments, contractual breach notification requirements, and ongoing oversight.
- Improve incident response readiness by conducting regular tabletop exercises, extending log retention, and clearly defining escalation and communication workflows.
- Limit breach impact through network segmentation, zero-trust principles, and proactive vulnerability and patch management.
Together, these measures help organizations reduce dwell time and limit the blast radius of incidents.
Centralized Healthcare Data Attracts Attackers
The TriZetto breach reflects a broader and concerning trend across the healthcare sector: IT vendors that manage claims processing and patient-related data have become prime targets for cybercriminals.
These organizations often aggregate vast amounts of sensitive information, making them especially valuable to attackers seeking long-term access rather than quick disruption.
As attackers maintain long-term access to centralized data, organizations are increasingly shifting from just perimeter-based security to zero-trust models.
