Skip to main content
Blue @ Work

Understanding types of cyberattacks

Part 3: Defending your business

Protecting your data and personal health information is vital. Wellmark Blue Cross and Blue Shield is here with tips for identifying cybersecurity risks and defending your business.

Why you’re at risk

You are at risk for a cyberattack because you use the internet to conduct your business, and you have access to valuable health care and financial data for individuals.

Types of cyberattacks

There are many types of threats when it comes to working online. Common threats include:

  • Malware — A malicious software intended to damage or disable computers or computer systems
  • Ransomware — A type of malware designed to block access to a computer system until money is paid
  • Phishing or vishing — Sending emails acting like a reputable company to convince people to give out personal information. Voice phishing, or vishing, is gaining access to private personal and financial information over the phone.
  • Masquerading or social engineering — An attack that uses a fake identity to gain unauthorized access to a personal computer

Reporting to Wellmark

If you suspect that you are a victim of a cyberattack or discover that member protected health information (PHI) has been compromised, you are required to report all incidents to Wellmark immediately. Contact your authorized Wellmark representative or email Send Email.

Quick tips

There are simple steps you can take to protect yourself from cyberattacks in the office and on the go:

If you get infected with ransomware... Contact your company's IT support resource. Do not rely on the hacker to un-encrypt your data. It is best to restore from backup data.
If your computer behaves oddly or outside its normal function...
Immediately contact your company's IT support resource, as you may be in the early stages of a malware attack. If you do not have a support contact, reboot your computer immediately.
If you receive a suspicious email that looks like it came from Wellmark...
Call your authorized Wellmark representative to verify whether or not the email came from Wellmark, or email Send Email to report the suspicious email.

Learn more to protect yourself against cybersecurity threats:

Reporting cyberattacks to WellmarkCybersecurity in the office
Reporting cyberattacks to Wellmark article Cybersecurity in the office article