www.securitymagazine.com
Open in
urlscan Pro
188.114.96.3
Public Scan
URL:
https://www.securitymagazine.com/articles/100999-young-consulting-and-blue-shield-of-california-announce-data-breach
Submission: On November 15 via api from LU — Scanned from NL
Submission: On November 15 via api from LU — Scanned from NL
Form analysis
3 forms found in the DOMName: quick-search — GET /search
<form id="quick-search-form" name="quick-search" method="get" action="/search">
<label for="q" alt="search" class="quick-search__label">Search</label>
<input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
<button class="quick-search__button"> search </button>
<button class="quick-search__close-button"> close search </button>
</form>
Name: quick-search — GET /search
<form id="quick-search-form" name="quick-search" method="get" action="/search">
<label for="q" alt="search" class="quick-search__label">Search</label>
<input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
<button class="quick-search__button"> search </button>
<button class="quick-search__close-button"> close search </button>
</form>
Name: quick-search — GET /search
<form id="quick-search-form" name="quick-search" method="get" action="/search">
<label for="q" alt="search" class="quick-search__label">Search</label>
<input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
<button class="quick-search__button"> search </button>
<button class="quick-search__close-button"> close search </button>
</form>
Text Content
Security Magazine logo * Sign In * Create Account * Sign Out * My Account Search search close search * NEWS * MANAGEMENT * PHYSICAL * CYBER * BLOG * COLUMNS * EXCLUSIVES * MEDIA * SECTORS * EVENTS * MORE * EMAG * SIGN UP! cart facebook twitter linkedin youtube * NEWS * Security Newswire * Technologies & Solutions * MANAGEMENT * Leadership Management * Enterprise Services * Security Education & Training * Logical Security * Security & Business Resilience * Profiles in Excellence * PHYSICAL * Access Management * Fire & Life Safety * Identity Management * Physical Security * Video Surveillance * Case Studies (Physical) * CYBER * Cybersecurity News * More * COLUMNS * Cyber Tactics * Leadership & Management * Security Talk * Career Intelligence * Leader to Leader * Cybersecurity Education & Training * EXCLUSIVES * Annual Guarding Report * Most Influential People in Security * The Security Benchmark Report * The Security Leadership Issue * Top Guard and Security Officer Companies * Top Cybersecurity Leaders * Women in Security * MEDIA * Videos * Podcasts * Polls * Photo Galleries * Videos * Cybersecurity & Geopolitical Discussion * Ask Me Anything (AMA) Series * SECTORS * Education: University * Hospitals & Medical Centers * Critical Infrastructure * More * EVENTS * Industry Events * Webinars * Solutions by Sector * Security 500 Conference * MORE * Call for Entries * Classifieds & Job Listings * Continuing Education * Featured Products * Newsletter * Sponsor Insights * Store * White Papers * EMAG * eMagazine * This Month's Content * Advertise Security Magazine logo search Search search close search cart facebook twitter linkedin youtube * Sign In * Create Account * Sign Out * My Account Security Magazine logo * NEWS * Security Newswire * Technologies & Solutions * MANAGEMENT * Leadership Management * Enterprise Services * Security Education & Training * Logical Security * Security & Business Resilience * Profiles in Excellence * PHYSICAL * Access Management * Fire & Life Safety * Identity Management * Physical Security * Video Surveillance * Case Studies (Physical) * CYBER * Cybersecurity News * More * BLOG * COLUMNS * Cyber Tactics * Leadership & Management * Security Talk * Career Intelligence * Leader to Leader * Cybersecurity Education & Training * EXCLUSIVES * Annual Guarding Report * Most Influential People in Security * The Security Benchmark Report * The Security Leadership Issue * Top Guard and Security Officer Companies * Top Cybersecurity Leaders * Women in Security * MEDIA * Videos * Cybersecurity & Geopolitical Discussion * Ask Me Anything (AMA) Series * Podcasts * Polls * Photo Galleries * SECTORS * Education: University * Hospitals & Medical Centers * Critical Infrastructure * More * EVENTS * Industry Events * Webinars * Solutions by Sector * Security 500 Conference * MORE * Call for Entries * Classifieds & Job Listings * Continuing Education * Featured Products * Newsletter * Sponsor Insights * Store * White Papers * EMAG * eMagazine * This Month's Content * Advertise * SIGN UP! CybersecuritySecurity NewswireCybersecurity NewsHospitals & Medical Centers YOUNG CONSULTING AND BLUE SHIELD OF CALIFORNIA ANNOUNCE DATA BREACH By Security Staff Image via Unsplash September 3, 2024 Young Consulting announced a data breach affecting Blue Shield of California subscribers in late August 2024. Young Consulting revealed that an unauthorized actor gained access to its computer network in April 2024 and downloaded copies of certain files. Young Consulting determined that this data belonged to Blue Shield of California subscribers. Young Consulting has informed Blue Shield of California subscribers that the following private information may have been stolen in the breach: names, Social Security numbers, dates of birth, and insurance claim information. KEYWORDS: data breach data breach notification health care security personal health information security personally identifiable information (PII) SHARE THIS STORY Looking for a reprint of this article? From high-res PDFs to custom plaques, order your copy today! 1 COMPLIMENTARY ARTICLE(S) LEFT Already Registered? Sign in now. RESTRICTED CONTENT You must have JavaScript enabled to enjoy a limited number of articles over the next 30 days. Please click here to continue without javascript.. Subscribe For Free! * Security eNewsletter & Other eNews Alerts * eMagazine Subscriptions * Manage My Preferences * Online Registration * Mobile App * Subscription Customer Service -------------------------------------------------------------------------------- THE MONEY LAUNDERING MACHINE: INSIDE THE GLOBAL CRIME EPIDEMIC - EPISODE 24 SECURITY’S TOP 5 – JUNE 2024 SECURITY’S TOP 5 – JULY & AUGUST 2024 MIDDLE EAST ESCALATION, HUMANITARIAN LAW AND DISINFORMATION – EPISODE 25 prevnext More Videos -------------------------------------------------------------------------------- SPONSORED CONTENT Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep! close * Sponsored byAMAROK HOW MULTI-SITE RISK ASSESSMENTS CAN GUIDE YOUR SECURITY INVESTMENTS PORTLAND MAINE TO PORTLAND OREGON * Sponsored byRed Hat MAXIMIZING BUSINESS BENEFITS WITH ROBUST HYBRID CLOUD SECURITY * Sponsored byAxis MODERNIZING RETAIL TECHNOLOGY OPERATIONS TO IMPROVE BUSINESS EFFICIENCY POPULAR STORIES 68% OF HEALTHCARE WORKERS EXPERIENCED A SUPPLY CHAIN ATTACK THE 2024 SECURITY BENCHMARK REPORT 93% OF HACKERS BELIEVE ENTERPRISE AI TOOLS CREATE A NEW ATTACK VECTOR 67% OF ORGANIZATIONS SAY EMPLOYEES LACK BASIC SECURITY AWARENESS IRANIAN CYBER ACTORS ARE TARGETING CRITICAL INFRASTRUCTURE ENTITIES SECURITY MAGAZINE IS LOOKING TO FEATURE INDIVIDUALS THAT ARE SHOWCASING EXCELLENCE WITHIN THE SECURITY INDUSTRY! Recognize security excellence—nominate today! EVENTS March 14, 2024 BALANCING ACT: NAVIGATING SECURITY TECH IN NONPROFIT ENTERTAINMENT SECTORS ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. March 19, 2024 ENHANCE DIGITAL FORENSICS WITH STREAMLINED ANALYSIS AND IN-DEPTH INVESTIGATIONS ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8. View All Submit An Event PRODUCTS SECURITY CULTURE: A HOW-TO GUIDE FOR IMPROVING SECURITY CULTURE AND DEALING WITH PEOPLE RISK IN YOUR ORGANISATION See More Products FEATURED PRODUCT FROM ROHDE & SCHWARZ Protecting people and assets with the R&S®QPS advanced technology security scanners READ MORE! RECOMMENDED ARTICLES * SECURITY'S TOP CYBERSECURITY LEADERS 2024 See More * ASSESSING THE PROS AND CONS OF AI FOR CYBERSECURITY See More * THE INTERSECTION OF CYBERSECURITY AND ARTIFICIAL INTELLIGENCE See More RELATED ARTICLES * 63,341 CUSTOMERS IMPACTED IN BLUE SHIELD OF CALIFORNIA DATA BREACH See More * LISA DAVIS NAMED CHIEF INFORMATION OFFICER OF BLUE SHIELD OF CALIFORNIA See More * 23ANDME ANNOUNCE DATA BREACH See More RELATED PRODUCTS See More Products * THE DATABASE HACKER'S HANDBOO See More Products × SIGN-UP TO RECEIVE TOP MANAGEMENT & RESULT-DRIVEN TECHNIQUES IN THE INDUSTRY. JOIN OVER 20,000+ INDUSTRY LEADERS WHO RECEIVE OUR PREMIUM CONTENT. SIGN UP TODAY! * RESOURCES * Advertise * Contact Us * Store * Want More * SIGN UP TODAY * Create Account * eMagazine * eNewsletter * Customer Service * Manage Preferences * SERVICES * Marketing Services * Reprints * Market Research * List Rental * Survey And Sample * STAY CONNECTED * LinkedIn * Facebook * YouTube * X (Twitter) * PRIVACY * PRIVACY POLICY * TERMS & CONDITIONS * DO NOT SELL MY PERSONAL INFORMATION * PRIVACY REQUEST * ACCESSIBILITY Copyright ©2024. All Rights Reserved BNP Media. Design, CMS, Hosting & Web Development :: ePublishing Security Magazine logo search Search search close search cart facebook twitter linkedin youtube * Sign In * Create Account * Sign Out * My Account Security Magazine logo * NEWS * Security Newswire * Technologies & Solutions * MANAGEMENT * Leadership Management * Enterprise Services * Security Education & Training * Logical Security * Security & Business Resilience * Profiles in Excellence * PHYSICAL * Access Management * Fire & Life Safety * Identity Management * Physical Security * Video Surveillance * Case Studies (Physical) * CYBER * Cybersecurity News * More * BLOG * COLUMNS * Cyber Tactics * Leadership & Management * Security Talk * Career Intelligence * Leader to Leader * Cybersecurity Education & Training * EXCLUSIVES * Annual Guarding Report * Most Influential People in Security * The Security Benchmark Report * The Security Leadership Issue * Top Guard and Security Officer Companies * Top Cybersecurity Leaders * Women in Security * MEDIA * Videos * Cybersecurity & Geopolitical Discussion * Ask Me Anything (AMA) Series * Podcasts * Polls * Photo Galleries * SECTORS * Education: University * Hospitals & Medical Centers * Critical Infrastructure * More * EVENTS * Industry Events * Webinars * Solutions by Sector * Security 500 Conference * MORE * Call for Entries * Classifieds & Job Listings * Continuing Education * Featured Products * Newsletter * Sponsor Insights * Store * White Papers * EMAG * eMagazine * This Month's Content * Advertise * SIGN UP! COOKIES AT BNP MEDIA This BNP Media website uses cookies to enhance user experience and to analyze performance and traffic on our site. By clicking “Accept All Cookies”, we can bring you the best experience we have to offer. If you'd like to take the time to set which cookies we can use, click 'Manage your Cookies'. If you are a registered visitor you will need to accept all cookies to have the targeted experience you desire. View our Privacy Policy ACCEPT ALL COOKIES Reject All Manage your Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. If you are a registered visitor you will need to accept all cookies to have the targeted experience you desire. BNP Media Privacy PolicyCookie List Allow All MANAGE CONSENT PREFERENCES PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices