The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
Health insurer Excellus BlueCross BlueShield announced Wednesday it was the target of a cyberattack that may have compromised personally identifying information of its members — multiple news reports say more than 10 million members may have been affected. The New York-based insurer said the breach dates back to December 2013 (it was discovered Aug. 5 of this year) and concerns members who received treatment in 31 upstate New York counties.
BlueCross BlueShield affiliates Anthem, Premera and CareFirst have also experienced data breaches in the past several months, with the Anthem breach exposing about 80 million Social Security numbers. Similar data may have been accessed by hackers in the Excellus breach. The company said information includes names, addresses, telephone numbers, dates of birth, Social Security numbers, member identification numbers, financial account information and/or medical claims information. In the Frequently Asked Questions section on its breach-information site, excellusfacts.com, the company says, “Our investigation has not determined that any information was removed from our systems and there is no evidence to date that any such information has been used inappropriately.”
Even so, members will have free access to two years of identity theft protection services through cybersecurity firm Kroll and credit monitoring from TransUnion. People who have been affected by the breach should receive a letter from Excellus, but you don’t need to wait for a letter to sign up for the free services.
It’s a good idea to take advantage of free credit monitoring and identity theft protection services, but you need to do some of the monitoring yourself, so you can quickly spot and stop unauthorized use of your identity or financial accounts. Whether or not you’re a victim of this specific breach, you need to make a habit of watching out for signs your identity has been stolen — it’s a common crime, and the more prepared you are to deal with it, the less likely you are to suffer lasting financial damage from it. Unexpected changes in your credit score could signal new-account fraud, which can occur if your Social Security number has been compromised as in the Excellus breach. You can monitor your credit scores for changes for free every month on Credit.com.
Image: istock
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams