Security concerns about HealthCare.gov are overblown, Democrats say
HHS officials report 32 security incidents since the site has launched
IDG News Service - Security concerns raised by Republican critics of the U.S. Department of Health and Human Services' botched rollout of HealthCare.gov have been overstated, according to a memo released Friday by two Democratic members of Congress.
HHS officials, in a briefing to lawmakers this week, reported just 32 security incidents at HealthCare.gov since its Oct. 1 launch, and "there have been no successful security attacks," said the memo from Democratic Reps. Henry Waxman of California and Diana DeGette of Colorado.
The briefing was "reassuring," the lawmakers wrote. "The security of Healthcare.gov has not been breached, and hackers have had no access to personally identifiable information. HHS officials indicated that they were conducting 24-7 system monitoring and ongoing assessments in order to ensure and strengthen system security."
But it's concerning that HHS officials have found so few security incidents, said a spokeswoman for Rep. Mike Rogers, a Michigan Republican who has questioned the site's security. Websites of comparable size to HealthCare.gov averaged more than 230 security incidents a day in the past year, said spokeswoman Kelsey Knight.
The lack of reported security incidents "is more concerning to us," she said. "That report shows that there's no system monitoring."
A cybersecurity expert has pointed out one security flaw at the site that could lead to phishing exploits, said Knight, whose boss is chairman of the House Intelligence Committee.
Eleven of the 32 security events remained under investigation as of Wednesday, Waxman and DeGette wrote in the memo.
Security investigators at HHS classified one of the remaining 21 events as an unsuccessful probe of the site and two incidents as inappropriate use of the site in violation of acceptable use policies. One of those two incidents was a denial-of-service attempt using malware called Destroy Obamacare, the memo said. Obamacare is the common name for the 2010 Affordable Care Act, the health insurance reform law that created HealthCare.gov.
Security investigators classified 15 of the incidents as unauthorized access, in which a website user gained unauthorized access to information. Those cases "were isolated in nature" and generally involved software bugs, the memo said. In one case that's been publicized, one user's personal information was shared with another user, the memo said, but "none of these events involved a significant breach of personal information."
In addition, security researchers ultimately decided two other events turned out to be "non-incidents," the memo said.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Is Your Big Data Solution Production-Ready?
- Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses
- IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center
- IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results
- Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts