Widespread security flaws expose sensitive public info

Hackers can access sensitive medical and financial information on individuals because of widespread security weaknesses in agency computer systems, officials told the Senate Governmental Affairs Committee today.

Outside and internal auditors at the Social Security Administration and the Department of Veterans Affairs found security shortcomings in agency systems, leaving data vulnerable to exposure or manipulation, according to the General Accounting Office. Both agencies defended their security practices but also admitted that the audits uncovered security shortcomings they were not aware of.

The audit of SSA revealed security breaches involving passwords, unprotected modems, lax implementation of audit trails and the vulnerability of the e-mail systems, said Sen. Fred Thompson (R-Tenn.), chairman of the Governmental Affairs Committee.

At the VA, there has been a "major failure" in general computer security management planning, said Harold F. Gracey Jr., acting assistant secretary for information and technology in the VA. "We clearly have weaknesses," he told the committee, but he also detailed several steps the VA has taken to correct the problem.

Significant information security weaknesses exist at all 24 federal agencies, and 17 agencies have deficiencies in their security planning and management, said Gene L. Dodaro, the assistant comptroller general at GAO. The most common weakness is poor control over access to sensitive data, Dodaro said.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.