DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bankers Life notified more than 566,000 after hack of employees’ email resulted in breach of PHI

Posted on November 7, 2018 by Dissent

The following is a Bankers Life announcement of a security incident that appears on HHS’s public breach tool under the name “CNO Financial Group, Inc.” According to the report to HHS, the breach affected 566,217 members protected health information. 


On October 25, Bankers Life1 notified certain customers about a data security issue. We take the privacy and security of your personal information seriously and for this reason want you to understand what we are doing to address this issue.

If you have a Medicare Supplement policy issued by Colonial Penn Life Insurance Company, you may have also been directed to this site.

We recently discovered that unauthorized third parties accessed credentials belonging to a limited number of our employees between May 30 and September 13, 2018. During this period, unauthorized third parties used improperly obtained employee information to gain access to certain company websites, potentially resulting in unauthorized access to personal information of policyholders and applicants.

When we first learned of this activity on August 7, we began an investigation and notified federal law enforcement. We hired an external forensics investigator to conduct the investigation and took steps to further restrict and monitor access to our systems and to enhance additional security procedures.

We notified individuals as required by law and other individuals whose information may have been accessed by unauthorized third parties. We separately contacted a limited group of individuals where we know their information was accessed by the unauthorized third parties.

The personal information that may have been accessed included names, addresses, date of birth, insurance information (such as application or policy number, types of insurance, premiums, dates of service and claim amounts) and the last four digits of Social Security numbers. For the vast majority of people, our investigation has not identified any unauthorized access to full Social Security numbers, driver’s license or state identification card numbers, bank account numbers, credit or debit card information, medications, diagnosis, or treatment plans.

We are offering free identity repair and credit monitoring services to all customers receiving notice of this incident. More information on how to enroll in these services can be found in the Reference Guide enclosed with your notification letter. We also encourage you to remain vigilant in monitoring your account statements and insurance transactions for incidents of fraud and identity theft, and to promptly report such incidents. We encourage you to routinely review bills, notices, statements and explanation of benefits that you receive from financial institutions, hospitals, doctors and health insurance companies.

We have included some frequently asked questions below. If you have other questions regarding this incident, please call (888) 250-5832 toll-free between 5 am – 5 pm Pacific Time, Monday through Friday, except holidays, or go to https://ide.myidcare.com/BankersLife. The toll-free number and website have been created specifically to answer questions about the incident and to assist with enrollment in identity repair and credit monitoring services.

Frequently Asked Questions

  1. Was I affected by this incident?
    • We have notified certain individuals because some personal information may have been accessed by unauthorized third parties.
    • These individuals were notified by letters that were mailed on October 25, 2018.
  2. What personal information may have been accessed?
    • The personal information that may have been accessed included names, addresses, date of birth, insurance information (such as application or policy numbers, types of insurance, premiums, dates of service and claim amounts) and the last four digits of Social Security numbers.
    • For a very limited number of people, there may have been additional information disclosed. If you are within this small category of people, you would have received a letter from us specifically stating this.
  3. What is Bankers Life doing to prevent this kind of incident from happening again?
    • Bankers Life takes the privacy and security of our customers’ personal information seriously.
    • When we first learned of the unauthorized activity, we began an investigation and notified federal law enforcement.
    • We also hired an external forensics investigator and took steps to further restrict and monitor access to our systems and to enhance additional security procedures.
  4. What steps can I take to protect myself?
    • Bankers Life has arranged for ID Experts to provide all individuals that received a notification letter from us with identity repair and credit monitoring free of charge.
    • You can enroll by going to https://ide.myidcare.com/BankersLife and using the enrollment code provided in the notification letter.
    • The Reference Guide enclosed with the notification letter includes additional information on steps you can take to monitor and protect your personal information.
  5. Who should I contact if I have questions?
    • Please call (888) 250-5832 with any questions, or for information on the identity protection services that are being provided.

No related posts.

Category: Business SectorHackHealth DataU.S.

Post navigation

← The theft of an Auckland legal aid lawyer’s laptop compromises 80 cases
IoT botnet infects 100,000 routers to send Hotmail, Outlook, and Yahoo spam →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.