SHARE
Facebook X Pinterest WhatsApp

Vermont Health Connect Breach Highlights Risks to Health Exchange System

New Threats Seen Subverting Digital Signature Validation A lot of bluster has been made among the media about the problems with the Affordable Care Act website, but one concern that has been severely underreported—or at least has not grabbed the banner headlines—is the attempted security breaches against the health exchange sites. Well, today comes the […]

Written By
SP
Sue Poremba
Nov 25, 2013
Slide Show

New Threats Seen Subverting Digital Signature Validation

A lot of bluster has been made among the media about the problems with the Affordable Care Act website, but one concern that has been severely underreported—or at least has not grabbed the banner headlines—is the attempted security breaches against the health exchange sites.

Well, today comes the news that a user has reported being the victim of a breach within the Vermont Health Connect site. According to CSO:

The person who reported the problem wasn’t named in the report. However, Greg Needle, the privacy administrator with Vermont Health Connect, confirmed that this person’s Social Security Number, as well as information submitted to the exchange during the application process, was obtained by an unauthorized party. In a letter sent to the Centers for Medicare and Medicaid Services (CMS) by Needle, the person learned about the breach due to an anonymous letter.

Allegedly, on the back of the envelope was the message: “Vermont Health Connect is not a secure site!” The message was repeated in the letter.

Unfortunately, we should probably get used to seeing more data breaches or attempted breaches. As Matthew Standart, director of Threat Intelligence at HB Gary, told me in an email, the health exchange system is likely to face a landscape of threats due to hackers and identity thieves looking to profit from breaching the system. The health exchange sites are a treasure trove of data for thieves (or anyone who may want to sabotage the system itself). As Standart told me, at the center of the Affordable Care Act is the Federal Data Services Hub, a database that centrally stores information about citizens.

Standart went on to say:

What could be unique is that this system will face some specific threats that not all other systems face, such as politically motivated hackers who, in their disapproval of the system itself, may seek to destroy, disrupt or degrade the system. And in the case of modern insider threats, there is also a risk of users who abuse their privileges in a malicious way for financial or other personal gain, and the inadvertent hacker that accidentally puts proprietary data at risk.

As many other Americans watch to see how the operational flaws in the website system are addressed and fixed, I’ll be keeping a close eye on how IT security professionals handle potential threats to data and privacy. I’m not the only one who will be watching. As Standart pointed out:

These internal and external threats put a spotlight on IT administrators to have tools in place that not only identify risks quickly, but can also mitigate them before the damage is done.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.