SlideShare a Scribd company logo
1 of 1
Download to read offline
Security concerns about HealthCare.gov are overblown,
Democrats say
Security concerns about HealthCare.gov are overblown, Democrats say | PCWorld
Security concerns raised by Republican critics of the U.S. Department of Health and Human
Services" botched rollout of HealthCare.gov have been overstated, according to a memo released
Friday by two Democratic members of Congress.
HHS officials, in a briefing to lawmakers this week, reported just 32 security incidents at
HealthCare.gov since its Oct. 1 launch, and "there have been no successful security attacks," said
the memo from Democratic Representatives Henry Waxman of California and Diana DeGette of
Colorado.
The briefing was "reassuring," the lawmakers wrote. "The security of Healthcare.gov has not been
breached, and hackers have had no access to personally identifiable information. HHS officials
indicated that they were conducting 24-7 system monitoring and ongoing assessments in order to
ensure and strengthen system security."
But it"s concerning that HHS officials have found so few security incidents, said a spokeswoman for
Representative Mike Rogers, a Michigan Republican who has questioned the site"s security.
Websites of comparable size to HealthCare.gov averaged more than 230 security incidents a day in
the past year, said spokeswoman Kelsey Knight.
The lack of reported security incidents "is more concerning to us," she said. "That report shows that
there"s no system monitoring."
A cybersecurity expert has pointed out one security flaw at the site that could lead to phishing
exploits, said Knight, whose boss is chairman of the House Intelligence Committee.
Eleven of the 32 security events remained under investigation as of Wednesday, Waxman and
DeGette wrote in the memo.
Security investigators at HHS classified one of the remaining 21 events as an unsuccessful probe of
the site and two incidents as inappropriate use of the site in violation of acceptable use policies. One
of those two incidents was a denial-of-service attempt using malware called Destroy Obamacare, the
memo said. Obamacare is the common name for the 2010 Affordable Care Act, the health insurance
reform law that created HealthCare.gov.
Security investigators classified 15 of the incidents as unauthorized access, in which a website user
gained unauthorized access to information. Those cases "were isolated in nature" and generally
involved software bugs, the memo said. In one case that"s been publicized, one user"s personal
information was shared with another user, the memo said, but "none of these events involved a
significant breach of personal information."
In addition, security researchers ultimately decided two other events turned out to be "nonincidents," the memo said.

More Related Content

Viewers also liked

8diagnosticos
8diagnosticos8diagnosticos
8diagnosticosNat Do
 
Viagem de uma gota de agua
Viagem de uma gota de aguaViagem de uma gota de agua
Viagem de uma gota de aguaMayjö .
 
Tg5 viagem de uma gota de agua (versão curta)
Tg5   viagem de uma gota de agua (versão curta)Tg5   viagem de uma gota de agua (versão curta)
Tg5 viagem de uma gota de agua (versão curta)Mayjö .
 
Mg perpendicularidade rectas planos
Mg perpendicularidade  rectas planosMg perpendicularidade  rectas planos
Mg perpendicularidade rectas planosjoaotome
 
Reino animalia porifera
Reino animalia   poriferaReino animalia   porifera
Reino animalia poriferaAna Curado
 
Certificadoparticipante
Certificadoparticipante Certificadoparticipante
Certificadoparticipante Maryori Prado
 
Trabalho transporte de energia,9º4
Trabalho transporte de energia,9º4Trabalho transporte de energia,9º4
Trabalho transporte de energia,9º4Mayjö .
 
Presentación4
Presentación4Presentación4
Presentación4akor991205
 
Origem da vida
Origem da vidaOrigem da vida
Origem da vidaAna Curado
 
Analisando e compondo musica com redes complexas
Analisando e compondo musica com redes complexasAnalisando e compondo musica com redes complexas
Analisando e compondo musica com redes complexasingemus
 
Evolucion de la comunicacion
Evolucion de la comunicacionEvolucion de la comunicacion
Evolucion de la comunicacion264135
 
Preguntassobreeducacion
PreguntassobreeducacionPreguntassobreeducacion
PreguntassobreeducacionCarlos Soler
 
M A F E Receita Federal Malha Fina X Empresas Contribuintes
M A F E  Receita  Federal  Malha  Fina X Empresas  ContribuintesM A F E  Receita  Federal  Malha  Fina X Empresas  Contribuintes
M A F E Receita Federal Malha Fina X Empresas Contribuintesguestd420a8
 

Viewers also liked (20)

8diagnosticos
8diagnosticos8diagnosticos
8diagnosticos
 
Viagem de uma gota de agua
Viagem de uma gota de aguaViagem de uma gota de agua
Viagem de uma gota de agua
 
Tg5 viagem de uma gota de agua (versão curta)
Tg5   viagem de uma gota de agua (versão curta)Tg5   viagem de uma gota de agua (versão curta)
Tg5 viagem de uma gota de agua (versão curta)
 
Comenzar
ComenzarComenzar
Comenzar
 
Etiqueta
EtiquetaEtiqueta
Etiqueta
 
Mg perpendicularidade rectas planos
Mg perpendicularidade  rectas planosMg perpendicularidade  rectas planos
Mg perpendicularidade rectas planos
 
Reprodução
ReproduçãoReprodução
Reprodução
 
Reino animalia porifera
Reino animalia   poriferaReino animalia   porifera
Reino animalia porifera
 
Certificadoparticipante
Certificadoparticipante Certificadoparticipante
Certificadoparticipante
 
Trabalho transporte de energia,9º4
Trabalho transporte de energia,9º4Trabalho transporte de energia,9º4
Trabalho transporte de energia,9º4
 
Humanismo 13
Humanismo 13Humanismo 13
Humanismo 13
 
revista farmatodo
revista farmatodo revista farmatodo
revista farmatodo
 
Saúde
SaúdeSaúde
Saúde
 
Presentación4
Presentación4Presentación4
Presentación4
 
Eldespido mujermercadolaboral
Eldespido mujermercadolaboralEldespido mujermercadolaboral
Eldespido mujermercadolaboral
 
Origem da vida
Origem da vidaOrigem da vida
Origem da vida
 
Analisando e compondo musica com redes complexas
Analisando e compondo musica com redes complexasAnalisando e compondo musica com redes complexas
Analisando e compondo musica com redes complexas
 
Evolucion de la comunicacion
Evolucion de la comunicacionEvolucion de la comunicacion
Evolucion de la comunicacion
 
Preguntassobreeducacion
PreguntassobreeducacionPreguntassobreeducacion
Preguntassobreeducacion
 
M A F E Receita Federal Malha Fina X Empresas Contribuintes
M A F E  Receita  Federal  Malha  Fina X Empresas  ContribuintesM A F E  Receita  Federal  Malha  Fina X Empresas  Contribuintes
M A F E Receita Federal Malha Fina X Empresas Contribuintes
 

Similar to Security concerns about HealthCare.gov are overblown, Democrats say

Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...
Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...
Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...pricklymadness108
 
Probe faults Obama administration for HealthCare.gov debacle
Probe faults Obama administration for HealthCare.gov debacleProbe faults Obama administration for HealthCare.gov debacle
Probe faults Obama administration for HealthCare.gov debaclewoodenpersonnel36
 
Obamacare crashes onths in coming not easily repaired - hCentive news
Obamacare crashes  onths in coming not easily repaired - hCentive newsObamacare crashes  onths in coming not easily repaired - hCentive news
Obamacare crashes onths in coming not easily repaired - hCentive newsAlisha North
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...Liberty University President Cries Foul After Leak Of Dept Of Education Repor...
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...Future Education Magazine
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateRedspin, Inc.
 
This Week in Washington ~ October 19, 2012
This Week in Washington ~ October 19, 2012This Week in Washington ~ October 19, 2012
This Week in Washington ~ October 19, 2012Patton Boggs LLP
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfinfo48697
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionJoe Nathans
 

Similar to Security concerns about HealthCare.gov are overblown, Democrats say (20)

Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...
Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...
Federal Health Site HealthCare.gov Stymied By Lack of Direction as Obamacare ...
 
Probe faults Obama administration for HealthCare.gov debacle
Probe faults Obama administration for HealthCare.gov debacleProbe faults Obama administration for HealthCare.gov debacle
Probe faults Obama administration for HealthCare.gov debacle
 
Obamacare crashes onths in coming not easily repaired - hCentive news
Obamacare crashes  onths in coming not easily repaired - hCentive newsObamacare crashes  onths in coming not easily repaired - hCentive news
Obamacare crashes onths in coming not easily repaired - hCentive news
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...Liberty University President Cries Foul After Leak Of Dept Of Education Repor...
Liberty University President Cries Foul After Leak Of Dept Of Education Repor...
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
This Week in Washington ~ October 19, 2012
This Week in Washington ~ October 19, 2012This Week in Washington ~ October 19, 2012
This Week in Washington ~ October 19, 2012
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdf
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Prism
PrismPrism
Prism
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
 

More from bashfulshopper843

FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeuxbashfulshopper843
 
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV bashfulshopper843
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeuxbashfulshopper843
 
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC bashfulshopper843
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeuxbashfulshopper843
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeuxbashfulshopper843
 
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV bashfulshopper843
 
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth StepTelevision / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Stepbashfulshopper843
 
Great Careers for Video Game Lovers
Great Careers for Video Game LoversGreat Careers for Video Game Lovers
Great Careers for Video Game Loversbashfulshopper843
 
Chile condemns 'cowardly' bomb blast
Chile condemns 'cowardly' bomb blastChile condemns 'cowardly' bomb blast
Chile condemns 'cowardly' bomb blastbashfulshopper843
 
{The best technology in number position 4
{The best technology in number position 4{The best technology in number position 4
{The best technology in number position 4bashfulshopper843
 
{The best technology in number position 3
{The best technology in number position 3{The best technology in number position 3
{The best technology in number position 3bashfulshopper843
 
Mega Millions approaches record jackpot for Tuesday's game
Mega Millions approaches record jackpot for Tuesday's gameMega Millions approaches record jackpot for Tuesday's game
Mega Millions approaches record jackpot for Tuesday's gamebashfulshopper843
 
Nishikori hires Michael Chang as part-time coach - Yahoo Sports
Nishikori hires Michael Chang as part-time coach - Yahoo SportsNishikori hires Michael Chang as part-time coach - Yahoo Sports
Nishikori hires Michael Chang as part-time coach - Yahoo Sportsbashfulshopper843
 

More from bashfulshopper843 (19)

Portables
Portables
Portables
Portables
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeux
 
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV
Bing Lance Kid Boîtier Media Avec Android TV
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeux
 
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
Lecteur Media Sous HEVC MAJ, Android HDMI, XBMC
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeux
 
FCS Networker Console De Jeux
FCS Networker   Console De JeuxFCS Networker   Console De Jeux
FCS Networker Console De Jeux
 
Media
Media
Media
Media
 
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV
Bing Lance Son Boîtier Media Avec Android TV
 
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth StepTelevision / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
 
Great Careers for Video Game Lovers
Great Careers for Video Game LoversGreat Careers for Video Game Lovers
Great Careers for Video Game Lovers
 
Test
TestTest
Test
 
Chile condemns 'cowardly' bomb blast
Chile condemns 'cowardly' bomb blastChile condemns 'cowardly' bomb blast
Chile condemns 'cowardly' bomb blast
 
Test
TestTest
Test
 
{The best technology in number position 4
{The best technology in number position 4{The best technology in number position 4
{The best technology in number position 4
 
{The best technology in number position 3
{The best technology in number position 3{The best technology in number position 3
{The best technology in number position 3
 
Mega Millions approaches record jackpot for Tuesday's game
Mega Millions approaches record jackpot for Tuesday's gameMega Millions approaches record jackpot for Tuesday's game
Mega Millions approaches record jackpot for Tuesday's game
 
Nishikori hires Michael Chang as part-time coach - Yahoo Sports
Nishikori hires Michael Chang as part-time coach - Yahoo SportsNishikori hires Michael Chang as part-time coach - Yahoo Sports
Nishikori hires Michael Chang as part-time coach - Yahoo Sports
 
Football - St. Olaf College
Football - St. Olaf CollegeFootball - St. Olaf College
Football - St. Olaf College
 

Security concerns about HealthCare.gov are overblown, Democrats say

  • 1. Security concerns about HealthCare.gov are overblown, Democrats say Security concerns about HealthCare.gov are overblown, Democrats say | PCWorld Security concerns raised by Republican critics of the U.S. Department of Health and Human Services" botched rollout of HealthCare.gov have been overstated, according to a memo released Friday by two Democratic members of Congress. HHS officials, in a briefing to lawmakers this week, reported just 32 security incidents at HealthCare.gov since its Oct. 1 launch, and "there have been no successful security attacks," said the memo from Democratic Representatives Henry Waxman of California and Diana DeGette of Colorado. The briefing was "reassuring," the lawmakers wrote. "The security of Healthcare.gov has not been breached, and hackers have had no access to personally identifiable information. HHS officials indicated that they were conducting 24-7 system monitoring and ongoing assessments in order to ensure and strengthen system security." But it"s concerning that HHS officials have found so few security incidents, said a spokeswoman for Representative Mike Rogers, a Michigan Republican who has questioned the site"s security. Websites of comparable size to HealthCare.gov averaged more than 230 security incidents a day in the past year, said spokeswoman Kelsey Knight. The lack of reported security incidents "is more concerning to us," she said. "That report shows that there"s no system monitoring." A cybersecurity expert has pointed out one security flaw at the site that could lead to phishing exploits, said Knight, whose boss is chairman of the House Intelligence Committee. Eleven of the 32 security events remained under investigation as of Wednesday, Waxman and DeGette wrote in the memo. Security investigators at HHS classified one of the remaining 21 events as an unsuccessful probe of the site and two incidents as inappropriate use of the site in violation of acceptable use policies. One of those two incidents was a denial-of-service attempt using malware called Destroy Obamacare, the memo said. Obamacare is the common name for the 2010 Affordable Care Act, the health insurance reform law that created HealthCare.gov. Security investigators classified 15 of the incidents as unauthorized access, in which a website user gained unauthorized access to information. Those cases "were isolated in nature" and generally involved software bugs, the memo said. In one case that"s been publicized, one user"s personal information was shared with another user, the memo said, but "none of these events involved a significant breach of personal information." In addition, security researchers ultimately decided two other events turned out to be "nonincidents," the memo said.