The danger that stems from a major data breach not only comes from the breach itself, but the phishing attempts and scams that happen post-incident. Attackers live by the mantra: never let a bad situation go to waste. There is currently a string of phishing emails being delivered to the general public claiming to be from Anthem, alerting the public about the breach, and attempting to get consumers to enter personally identifying information (PII), such as social security numbers or credit card information.
The website that victims are visiting through the link within the email is not currently known to contain any malicious software or exploits. If you receive an email from Anthem, make sure that the website actually belongs to them. An easy way to tell is to hover over the link within the email. If the url that the link delivers to is anything but https://www.anthemfacts.com/ or https://anthem.allclearid.com/ – be very suspicious.
If you have any further questions regarding this bill, email
Nate Gravel – Director of the Information Security Practice at firstname.lastname@example.org
In this blog post, we discuss how outsourcing cybersecurity operations to a vCISO can help businesses, including SMBs, tackle the cybersecurity talent shortage.
In this blog post and video, we explore need-to-know privilege in cybersecurity and why it’s important for organizations to assign user permissions on a need-to-know basis.
In this blog post, we discuss the importance of email security for businesses and explore the VIPRE and Sendmarc email protection technology solutions.