A healthcare organization relies on a third-party service provider to manage its electronic health records (EHR) system. Recently, the service provider experienced a security breach, potentially exposing sensitive patient information. What type of vulnerability does this scenario best illustrate?
Supply Chain
Zero-day
Misconfiguration
Insider Threat