An Invitation To Identity Theft

ObamaCare could have a very negative affect on my life in the coming months. My husband and I will be losing our health insurance on January 1. The questions is, “Do we go to the ObamaCare website and risk having our identity stolen, or do we go without health insurance?” How dangerous is it to type your personal information into the ObamaCare website? Well, an article posted at the CNBC website last Monday provides answers to that question.

The article reports:

It could take a year to secure the risk of “high exposures” of personal information on the federal Obamacare online exchange, a cybersecurity expert told CNBC on Monday.

“When you develop a website, you develop it with security in mind. And it doesn’t appear to have happened this time,” said David Kennedy, a so-called “white hat” hacker who tests online security by breaching websites. He testified on Capitol Hill about the flaws of HealthCare.gov last week.

“It’s really hard to go back and fix the security around it because security wasn’t built into it,” said Kennedy, chief executive of TrustedSec. “We’re talking multiple months to over a year to at least address some of the critical-to-high exposures on the website itself.”

This is not encouraging. Another online security expert stated that the ObamaCare website needs to be torn down and rebuilt from scratch.

The article further reports:

Last month, a Sept. 27 government memorandum surfaced in which two HHS officials said the security of the site had not been properly tested before it opened, creating “a high risk.”

HHS had explained then that steps were taken to ease security concerns after the memo was written, and that consumer information was secure. Technicians fixed a security bug in the password reset function in late October, the agency said.

But on CNBC, Kennedy disputed those claims, saying vulnerabilities remain on “everything from hacking someone’s computer so when you visit the website it actually tries to hack your computer back, all the way to being able to extract email addresses, users names—first name, last name—[and] locations.”

It really is time for Plan B.

Enhanced by Zemanta