Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025

      New Xbox games launching this week, from June 2 through June 8 — Zenless Zone Zero finally comes to Xbox

      June 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025
      Recent

      My top 5 must-play PC games for the second half of 2025 — Will they live up to the hype?

      June 1, 2025

      A week of hell with my Windows 11 PC really makes me appreciate the simplicity of Google’s Chromebook laptops

      June 1, 2025

      Elden Ring Nightreign Night Aspect: How to beat Heolstor the Nightlord, the final boss

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout

    Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout

    February 19, 2025

    cybersecurity compliance

    Health Net Federal Services, LLC (HNFS) and its parent company, Centene Corporation, have agreed to pay over $11 million to resolve allegations that they falsely certified compliance with cybersecurity requirements under a contract with the U.S. Department of Defense (DoD).

    The settlement highlights the growing enforcement of cybersecurity regulations for government contractors handling sensitive information.

    Background of the Settlement

    HNFS, based in Rancho Cordova, California, and its parent company, St. Louis-based Centene Corporation, were accused of failing to meet required cybersecurity standards while administering the Defense Health Agency’s (DHA) TRICARE health benefits program. TRICARE provides medical benefits to U.S. servicemembers and their families, making cybersecurity compliance a critical aspect of the contract.

    According to the U.S. Department of Justice (DOJ), HNFS falsely certified its compliance with cybersecurity controls between 2015 and 2018. These certifications were submitted in annual reports to DHA, as required under the terms of its TRICARE administration contract. The U.S. government alleged that HNFS failed to scan for known vulnerabilities and address security flaws within the required response times, as outlined in its System Security Plan.

    Centene Corporation, which acquired HNFS’s corporate parent in 2016, assumed the liabilities of HNFS, making it a party to the settlement. The total amount agreed upon in the settlement is $11,253,400.

    Government’s Response to Cybersecurity Lapses

    Government officials emphasized the importance of cybersecurity compliance, particularly when handling sensitive government and personal data.

    “Companies that hold sensitive government information, including information about the nation’s servicemembers and their families, must meet their contractual obligations to protect it,” said Acting Assistant Attorney General Brett A. Shumate, head of the DOJ’s Civil Division. “We will continue to pursue knowing violations of cybersecurity requirements by federal contractors and grantees to protect Americans’ privacy and economic and national security.”

    Acting U.S. Attorney Michele Beckwith for the Eastern District of California reinforced this stance, stating, “When HNFS failed to uphold its cybersecurity obligations, it didn’t just breach its contract with the government, it breached its duty to the people who sacrifice so much in defense of our nation.”

    Kenneth DeChellis, Special Agent in Charge of the Cyber Field Office at the Defense Criminal Investigative Service (DCIS), highlighted the potential risks of cybersecurity failures, stating, “This settlement reflects the significance of protecting TRICARE and the service members and their families who depend on the health care program from risks of exploitation.”

    Specific Allegations Against HNFS

    The DOJ detailed several cybersecurity failures that contributed to the allegations against HNFS:

    • Failure to Scan for Vulnerabilities: HNFS did not conduct timely scans to identify known cybersecurity vulnerabilities within its systems.
    • Unaddressed Security Risks: Reports from third-party security auditors and HNFS’s own internal audit team identified cybersecurity weaknesses that were not remedied.
    • Asset Management Issues: HNFS struggled with managing and securing its IT assets, which increased risks of unauthorized access.
    • Inadequate Access Controls: Weak access control mechanisms potentially left sensitive data exposed to unauthorized users.
    • Configuration and Firewall Weaknesses: The company failed to properly configure security settings and maintain firewall protections, increasing the risk of external threats.
    • Use of Outdated Hardware and Software: End-of-life technology that was no longer supported by vendors remained in use, exposing systems to unpatched vulnerabilities.
    • Poor Patch Management: HNFS did not install critical security updates in a timely manner, leaving systems open to known cyber threats.
    • Lax Password Policies: Weak password security policies increased the likelihood of credential theft and unauthorized access.

    Implications for Federal Contractors

    The settlement underscores the increasing scrutiny on cybersecurity compliance for government contractors. As cyber threats grow more sophisticated, agencies like the DOJ and DoD are enforcing strict measures to ensure companies entrusted with sensitive government data adhere to cybersecurity best practices.

    Failure to comply with cybersecurity requirements not only puts government contracts at risk but also exposes organizations to potential financial penalties and reputational damage. The False Claims Act, which holds contractors accountable for false certifications of compliance, remains a powerful tool for the government to enforce cybersecurity standards.

    Conclusion

    The $11 million settlement between Health Net Federal Services, Centene Corporation, and the U.S. government sends a clear message about the importance of cybersecurity compliance in federal contracts. Companies handling sensitive government information must prioritize security measures to protect data from cyber threats.

    As regulatory oversight increases, companies must strengthen their cybersecurity frameworks, ensure compliance with contract obligations, and take proactive steps to protect sensitive information from cyber threats.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Ultimate MSP Guide to Structuring and Selling vCISO Services
    Next Article Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

    Related Posts

    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    June 2, 2025
    Security

    Google AI Edge Gallery: Unleash On-Device AI Power on Your Android (and Soon iOS!)

    June 2, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    This Xbox Game Pass trick gets you Ultimate for $8.45 a month using an old loophole

    News & Updates

    Apple Pay is on the way to Windows! But you need an iPhone to use it.

    Development

    Mark Zuckerberg says Meta is developing AI friends to beat “the loneliness epidemic” — after Bill Gates claimed AI will replace humans for most things

    News & Updates

    Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

    Development

    Highlights

    Exposed! The AI-enhanced social media bot farm that pumped out Kremlin propaganda on Twitter

    July 11, 2024

    The US Justice Department, working in coordination with Canadian and Dutch authorities, has seized two…

    Top 10 Best Practices for Effective Data Protection

    May 16, 2025

    Announcing Rsdoctor 1.0 – one-stop, intelligent build analyzer

    March 31, 2025

    APPLE-SA-04-16-2025-2 macOS Sequoia 15.4.1

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.