Tuesday, March 4, 2025
Homecyber securityConsulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Published on

SIEM as a Service

Follow Us on Google News

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay $11.3 million to resolve allegations of failing to meet cybersecurity requirements.

Guidehouse Inc., headquartered in McLean, Virginia, will pay $7.6 million, while Nan McKay and Associates, based in El Cajon, California, will pay $3.7 million.

The allegations stem from violations of the False Claims Act related to contracts intended to ensure a secure environment for low-income New Yorkers to apply online for federal rental assistance during the COVID-19 pandemic.

Cybersecurity Failures and Data Breach

In early 2021, Congress established the Emergency Rental Assistance Program (ERAP) to assist eligible low-income households with rent and other housing-related expenses during the COVID-19 pandemic.

The New York Office of Temporary and Disability Assistance (OTDA) administered the state’s ERAP.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Guidehouse, as the prime contractor, and Nan McKay, as the subcontractor, were tasked with ensuring the cybersecurity of the ERAP technology.

However, both companies admitted to failing to conduct the required pre-production cybersecurity testing.

As a result, when the ERAP website went live on June 1, 2021, it was shut down just 12 hours after a data breach compromised applicants’ personally identifiable information (PII).

The companies acknowledged that proper cybersecurity testing could have prevented the breach.

Additionally, Guidehouse admitted using a third-party data cloud software program to store PII without obtaining OTDA’s permission, further violating their contract.

Principal Deputy Assistant Attorney General Brian M. Boynton emphasized the importance of cybersecurity obligations tied to federal funding, stating, “The Justice Department will continue to pursue knowing violations of material cybersecurity requirements aimed at protecting sensitive personal information.

U.S. Attorney Carla B. Freedman for the Northern District of New York echoed this sentiment, highlighting the need for contractors to take their cybersecurity obligations seriously.

A whistleblower lawsuit filed under the False Claims Act by Elevation 33 LLC, owned by a former Guidehouse employee, prompted the investigation.

The whistleblower will receive a $1,949,250 share of the settlement amount.

The settlements underscore the government’s commitment to holding entities accountable for cybersecurity failures.

Acting Inspector General Richard K. Delmar of the Department of the Treasury and New York State Comptroller Thomas P. DiNapoli stressed the importance of safeguarding personal information and maintaining the integrity of vital government programs.

The case, captioned United States ex rel. Elevation 33, LLC v. Guidehouse Inc. et al., Case No. 1:22-cv-206 (N.D.N.Y.), was handled by Trial Attorney J. Jennifer Koh and Assistant U.S.

Attorney Adam J. Katz, with assistance from the Department of the Treasury OIG and the Office of the New York State Comptroller.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...