recommended reading

Skip the Website, 16 Hacks and Other News

andrea crisante/

The rocky rollout of, the website for people to sign up for health insurance under the Affordable Care Act, has garnered a lot of attention from the media as well as technology analysts. Here's our daily roundup of some of the key reports you may have missed:

  • Skip the Website: The White House says it is willing to let health plan customers skip the online marketplace at the troubled and enroll in plans directly with insurance companies, The Wall Street Journal reports. "It's the end here that matters, not necessarily the means," White House Press Secretary Jay Carney said. "We have to make sure that there are other means available for the American people, even as we make improvements to the website."
  • Administration Would Be Happy With a Low B: The government will be satisfied if 80 percent of users are able to buy health insurance online, according to The Washington Post. The paper noted that this number -- which hasn’t offiically been made public -- is the first known performance standard for President Obama’s health care reform. The Post also noted that, by this measure, a success for the government could still leave one in five people who try to sign up through the site unable to do so.  
  • Contractors Messed Up Fed Retirement Benefits Before CGI Federal, the lead contractor on before the website’s failed launch on Oct. 1, “is filled with executives from a company that mishandled at least 20 other government IT projects, including a flawed effort to automate retirement benefits for millions of federal workers, documents and interviews show,” The Post reports.
  • Contractors and Officials Were Worried: Lawmakers released a series of July emails between CGI Federal and Health and Human Services Department officials revealing concerns about development, testing and functionality months before the site's launch, Government Health IT reports.  
  • 16 Hacks: HHS is investigating 16 alleged hacks on, all of which failed, according to CNN. The agency also is looking into a denial-of-service tool that aimed to burden the site but apparently was not activated.

(Image via andrea crisante/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.