Security Expert: Healthcare.gov Risks Even Worse After ‘Fix’

December 4, 2013 11:52 amViews: 524

Obamacare is a HUGE Train wreck


The Obamacare healthcare plan and the Healthcare.gov is probably one of the biggest unmitigated disasters our government has ever rolled out, on any level, at any time. One security expert, David Kennedy, CEO of the online security firm TrustedSec, says that there was never ANY security built into the site and even now after the big "fix", there are even more security risks.

For Barack Obama to be so fundamentally withdrawn from what was really going on with "his" website, from what was supposed to be his signature, crowning achievement as President, shows an absolutely astounding lack of leadership and management skills.

How much damage is Obama going to be allowed to do to our healthcare system and our economy before Congress steps in and says, enough?

Read more below from The Washington Free Beacon and watch the video after that:

The Obamacare insurance marketplace is even more vulnerable to security breaches since the administration “fixed” Healthcare.gov, according to a cyber security expert.

Health and Human Services (HHS) released a progress report on Sunday following its self-imposed Nov. 30 deadline to repair the website, saying that the “team has knocked more than 400 bug fixes and software improvements off the punch list.”

The administration said that the “site capacity is stable at its intended level,” though the site continued to crash on Monday.

The eight-page report made no mention of the website’s numerous security flaws, which experts say put Americans’ personal information at risk.

“It doesn’t appear that any security fixes were done at all,” David Kennedy, CEO of the online security firm TrustedSec, told the Washington Free Beacon.

Kennedy said fundamental safeguards missing from Healthcare.gov that were identified by his company more than a month ago have yet to be put in place.

“There are a number of security concerns already with the website, and that’s without even actually hacking the site, that’s just a purely passive analysis of [it],” he said. “We found a number of critical exposures that were around sensitive information, the ability to hack into the site, things like that. We reported those issues and none of those appear to have been addressed at all.”

Related Posts For You:

Tags: