Skip to main content
Blue @ Work

Cybersecurity in the office

Part 4: Preventing breaches before they happen

Maintaining cybersecurity inside the office is crucial to the well-being of your business and Wellmark Blue Cross and Blue Shield. If employee data is lost or stolen, all individuals involved can be negatively affected. Wellmark is here to support you with a series of helpful tips.

Awareness is key

In addition to being aware of cyber threats, your business should have a solid firewall, intrusion detection and prevention system, antivirus protection, and perform regular third-party software updates. Staying up-to-date on cybersecurity and protecting member data is a key to success for your business and Wellmark.

Reporting to Wellmark

If you suspect that you are a victim of a cyberattack or discover that employee protected health information (PHI) has been compromised, you are required to report all incidents to Wellmark immediately. Be sure to carefully review your contract for details on filing reports.

Quick tips

A cyberattack can start with just one wrong click. Do you know what to do to protect your business? Be savvy about email, phone calls, and any institution requesting personal information. Here are some quick tips:

IF:THEN:
If you receive a suspicious phone call from someone pretending to be from Wellmark... Hang up and report the information to your authorized Wellmark representative or email CyberResponse@Wellmark.com Send Email.
If you see an out-of-the-ordinary pop-up asking for sensitive information like your user ID or password...
Call your IT support resources. If you do not have one, immediately reboot your computer. Do not attempt to close the window.
If you get infected with ransomware...
Contact your company’s IT support resource. Do not rely on the hacker to un-encrypt your data. It is best to restore from backup data.

Learn more to protect yourself against cybersecurity threats:

Understanding types of cyberattacksCybersecurity on the go
Understanding types of cyberattacks article Cybersecurity on the go article