Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    • A Look At The Last Generation Of Internal Combustion Engines
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

      May 5, 2022

      Cybersecurity Myths that are Compromising Your Data and How to Address Them

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

      May 14, 2022

      Apple vs. Dell: Choosing Which Company to Work For

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Security»Data Breach»80 million Anthem customers need to follow this advice

    80 million Anthem customers need to follow this advice

    3
    By Tony Bradley on February 10, 2015 Data Breach, Data Protection, Identity Theft, Security, Security Awareness, Social Engineering

    There isn’t much the 80 million Anthem customers can do at this point. Their data has already been exposed or compromised in the Anthem breach, and unfortunately most of it is data you can’t just cancel or change: name, address, Social Security number, etc.

    I wrote a post with 5 things Anthem customers should do to monitor and protect their identities in the wake of the breach. Most of the tips actually apply to anyone affected by any breach. Actually, most of it is just good advice to follow in general even if you’re not sure your data has been compromised in a breach.

    Anthem customers, we feel your pain. The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting.

    Any breach that exposes data from millions of customers (or even thousands really) is bad, but the Anthem breach is actually worse than retail breaches like Target because of the type of information that was compromised. The fallout and damage from a compromised credit card can be undone. You can’t easily “undo” your name, birthdate, or Social Security number. Now that attackers have your personal information, your identity could be stolen tomorrow, next week, or three years from now.

    There’s no way any individual Anthem customer could have protected themselves in this incident, but now that it’s happened, there are some steps you can (and should) take to monitor and protect your identity, in the likelihood that attackers have your information.

    1. Visit AnthemFacts

    The AnthemFact.com FAQ site is the best source of current information about the data breach.

    2. Take advantage of free credit monitoring

    Anthem states, “All impacted members will receive notice via mail which will advise them of the protections being offered to them as well as any next steps.”

    When you receive that notice, follow the instructions and take advantage of any protection or services Anthem is providing.

    Read all of the tips at PCWorld: 5 things all Anthem customers should do after the massive data breach.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleReview: Burg 12 smartwatch
    Next Article Broadband must be fast, fair, and open
    Tony Bradley
    • Website
    • Facebook
    • Twitter
    • LinkedIn

    I have a passion for technology and gadgets--with a focus on Microsoft and security--and a desire to help others understand how technology can affect or improve their lives. I also love spending time with my wife, 7 kids, 2 dogs, 5 cats, 1 rabbit, 2 ferrets, a pot-bellied pig, and sulcata tortoise, and I like to think I enjoy reading and golf even though I never find time for either. You can contact me directly at tony@xpective.net. For more from me, you can follow me on Twitter, Facebook, Instagram and LinkedIn.

    Related Posts

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Ransomware is Indiscriminatory – Prepare for Everything to Fail

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    3 Comments

    1. rdwybldr on February 12, 2015 1:33 pm

      two years isn’t enough your ssn is for the remainder of your life….anthem should offer protection for the remainder of customers life…or figure out with gov how to change ssn for each person affected

      • Tony Bradley on February 12, 2015 1:42 pm

        Agreed. Really, I agree with Chester Wisniewski who I spoke to for this article. Companies and govt agencies should immediately stop using the SSN as an identifier at all. Nobody except you and the IRS has any real reason to know your SSN. If they stopped using the SSN and created their own unique identifiers for customers there wouldn’t be any chance of the SSN being compromised, and a new unique identifier could be issued in the case of a breach.

        The sad but fortunate news is that there will most likely be at least one other breach that will affect these 80 million customers in the next two years, and that company will provide more credit and identity monitoring. At the rate data breaches occur it seems like we should all have free credit and identity monitoring in perpetuity.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    PopSpective
    Coffee and Politics
    Coffee and Politics
    Coffee and Politics
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.