Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 31, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 31, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 31, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 31, 2025

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025

      Xbox Game Pass just had its strongest content quarter ever, but can we expect this level of quality forever?

      May 31, 2025

      Gaming on a dual-screen laptop? I tried it with Lenovo’s new Yoga Book 9i for 2025 — Here’s what happened

      May 31, 2025

      We got Markdown in Notepad before GTA VI

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025
      Recent

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025

      Filament Is Now Running Natively on Mobile

      May 31, 2025

      How Remix is shaking things up

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025
      Recent

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025

      Xbox Game Pass just had its strongest content quarter ever, but can we expect this level of quality forever?

      May 31, 2025

      Gaming on a dual-screen laptop? I tried it with Lenovo’s new Yoga Book 9i for 2025 — Here’s what happened

      May 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout

    Health Net, Centene Settle Cybersecurity Fraud Allegations with $11M Payout

    February 19, 2025

    cybersecurity compliance

    Health Net Federal Services, LLC (HNFS) and its parent company, Centene Corporation, have agreed to pay over $11 million to resolve allegations that they falsely certified compliance with cybersecurity requirements under a contract with the U.S. Department of Defense (DoD).

    The settlement highlights the growing enforcement of cybersecurity regulations for government contractors handling sensitive information.

    Background of the Settlement

    HNFS, based in Rancho Cordova, California, and its parent company, St. Louis-based Centene Corporation, were accused of failing to meet required cybersecurity standards while administering the Defense Health Agency’s (DHA) TRICARE health benefits program. TRICARE provides medical benefits to U.S. servicemembers and their families, making cybersecurity compliance a critical aspect of the contract.

    According to the U.S. Department of Justice (DOJ), HNFS falsely certified its compliance with cybersecurity controls between 2015 and 2018. These certifications were submitted in annual reports to DHA, as required under the terms of its TRICARE administration contract. The U.S. government alleged that HNFS failed to scan for known vulnerabilities and address security flaws within the required response times, as outlined in its System Security Plan.

    Centene Corporation, which acquired HNFS’s corporate parent in 2016, assumed the liabilities of HNFS, making it a party to the settlement. The total amount agreed upon in the settlement is $11,253,400.

    Government’s Response to Cybersecurity Lapses

    Government officials emphasized the importance of cybersecurity compliance, particularly when handling sensitive government and personal data.

    “Companies that hold sensitive government information, including information about the nation’s servicemembers and their families, must meet their contractual obligations to protect it,” said Acting Assistant Attorney General Brett A. Shumate, head of the DOJ’s Civil Division. “We will continue to pursue knowing violations of cybersecurity requirements by federal contractors and grantees to protect Americans’ privacy and economic and national security.”

    Acting U.S. Attorney Michele Beckwith for the Eastern District of California reinforced this stance, stating, “When HNFS failed to uphold its cybersecurity obligations, it didn’t just breach its contract with the government, it breached its duty to the people who sacrifice so much in defense of our nation.”

    Kenneth DeChellis, Special Agent in Charge of the Cyber Field Office at the Defense Criminal Investigative Service (DCIS), highlighted the potential risks of cybersecurity failures, stating, “This settlement reflects the significance of protecting TRICARE and the service members and their families who depend on the health care program from risks of exploitation.”

    Specific Allegations Against HNFS

    The DOJ detailed several cybersecurity failures that contributed to the allegations against HNFS:

    • Failure to Scan for Vulnerabilities: HNFS did not conduct timely scans to identify known cybersecurity vulnerabilities within its systems.
    • Unaddressed Security Risks: Reports from third-party security auditors and HNFS’s own internal audit team identified cybersecurity weaknesses that were not remedied.
    • Asset Management Issues: HNFS struggled with managing and securing its IT assets, which increased risks of unauthorized access.
    • Inadequate Access Controls: Weak access control mechanisms potentially left sensitive data exposed to unauthorized users.
    • Configuration and Firewall Weaknesses: The company failed to properly configure security settings and maintain firewall protections, increasing the risk of external threats.
    • Use of Outdated Hardware and Software: End-of-life technology that was no longer supported by vendors remained in use, exposing systems to unpatched vulnerabilities.
    • Poor Patch Management: HNFS did not install critical security updates in a timely manner, leaving systems open to known cyber threats.
    • Lax Password Policies: Weak password security policies increased the likelihood of credential theft and unauthorized access.

    Implications for Federal Contractors

    The settlement underscores the increasing scrutiny on cybersecurity compliance for government contractors. As cyber threats grow more sophisticated, agencies like the DOJ and DoD are enforcing strict measures to ensure companies entrusted with sensitive government data adhere to cybersecurity best practices.

    Failure to comply with cybersecurity requirements not only puts government contracts at risk but also exposes organizations to potential financial penalties and reputational damage. The False Claims Act, which holds contractors accountable for false certifications of compliance, remains a powerful tool for the government to enforce cybersecurity standards.

    Conclusion

    The $11 million settlement between Health Net Federal Services, Centene Corporation, and the U.S. government sends a clear message about the importance of cybersecurity compliance in federal contracts. Companies handling sensitive government information must prioritize security measures to protect data from cyber threats.

    As regulatory oversight increases, companies must strengthen their cybersecurity frameworks, ensure compliance with contract obligations, and take proactive steps to protect sensitive information from cyber threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Ultimate MSP Guide to Structuring and Selling vCISO Services
    Next Article Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

    Related Posts

    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How to Detect AI Writing

    Development

    Model-Driven Heart Rate Estimation and Heart Murmur Detection Based on Phonocardiogram

    Development

    CVE-2025-4575 – OpenSSL -addreject Option Truncation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Development

    Highlights

    Pixyne is a tool to fix your photos

    May 16, 2025

    Use Pixyne to quickly review your photo folders, safely delete bad and similar shots, fix…

    Web Components Demystified

    March 14, 2025

    MIT delegation mainstreams biodiversity conservation at the UN Biodiversity Convention, COP16

    December 7, 2024

    UX in Universal Design Series: The Importance of Customizable Gestures in Health Systems – 6

    August 22, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.