Witnesses say information security at VA still weak

Wilshusen said under the Federal Information Security Management Act, it was VA’s responsibility to ensure its contractors were following the proper security procedures, including encrypting sensitive data on the laptop. In order to prevent a similar breach, he stressed that VA needed stronger, two-factor security controls for networked computers and to ensure any device linked up to the network is completely encrypted.

VA chief information officer Roger Baker acknowledged that information security has been a challenge for his department, but said since he took over last year he has made it his top priority and outlined a number of changes under way to the department’s approach. That includes on-site audits of contractors thought to be in violation of the policies and creating a program that will allow VA to instantly identify any unauthorized or unencrypted devices attached to its network.

“I recognize that we are far from perfect and have a long way to go to achieve our information protection goals,” Baker said.

Wilshusen said many of the problems at VA stem from the department’s previous, decentralized approach to information security. He admitted that some progress has taken place on that front since the 2006 theft of a laptop containing personal data on more than 26 million veterans. He said since then the department has made information security a greater priority.

Tags

Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. regular

 

Main Area Top ↴

 

Main Area Middle ↴
Main Area Bottom ↴

Most Popular

Load more

Video

See all Video