www.securitymagazine.com Open in urlscan Pro
188.114.96.3  Public Scan

URL: https://www.securitymagazine.com/articles/100999-young-consulting-and-blue-shield-of-california-announce-data-breach
Submission: On November 15 via api from LU — Scanned from NL

Form analysis 3 forms found in the DOM

Name: quick-searchGET /search

<form id="quick-search-form" name="quick-search" method="get" action="/search">
  <label for="q" alt="search" class="quick-search__label">Search</label>
  <input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
  <button class="quick-search__button"> search </button>
  <button class="quick-search__close-button"> close search </button>
</form>

Name: quick-searchGET /search

<form id="quick-search-form" name="quick-search" method="get" action="/search">
  <label for="q" alt="search" class="quick-search__label">Search</label>
  <input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
  <button class="quick-search__button"> search </button>
  <button class="quick-search__close-button"> close search </button>
</form>

Name: quick-searchGET /search

<form id="quick-search-form" name="quick-search" method="get" action="/search">
  <label for="q" alt="search" class="quick-search__label">Search</label>
  <input type="search" name="q" id="q" placeholder="Search" tabindex="1" value="Search" onfocus="this.value = ''">
  <button class="quick-search__button"> search </button>
  <button class="quick-search__close-button"> close search </button>
</form>

Text Content

Security Magazine logo
 * Sign In
 * Create Account
 * Sign Out
 * My Account

Search search close search

 * NEWS
 * MANAGEMENT
 * PHYSICAL
 * CYBER
 * BLOG
 * COLUMNS
 * EXCLUSIVES
 * MEDIA
 * SECTORS
 * EVENTS
 * MORE
 * EMAG
 * SIGN UP!

cart
facebook twitter linkedin youtube
 * NEWS
 * Security Newswire
 * Technologies & Solutions

 * MANAGEMENT
 * Leadership Management
 * Enterprise Services
 * Security Education & Training
 * Logical Security
 * Security & Business Resilience
 * Profiles in Excellence

 * PHYSICAL
 * Access Management
 * Fire & Life Safety
 * Identity Management
 * Physical Security
 * Video Surveillance
 * Case Studies (Physical)

 * CYBER
 * Cybersecurity News
 * More

 * COLUMNS
 * Cyber Tactics
 * Leadership & Management
 * Security Talk
 * Career Intelligence
 * Leader to Leader
 * Cybersecurity Education & Training

 * EXCLUSIVES
 * Annual Guarding Report
 * Most Influential People in Security
 * The Security Benchmark Report
 * The Security Leadership Issue
 * Top Guard and Security Officer Companies
 * Top Cybersecurity Leaders
 * Women in Security

 * MEDIA
 * Videos
 * Podcasts
 * Polls
 * Photo Galleries

 * Videos
 * Cybersecurity & Geopolitical Discussion
 * Ask Me Anything (AMA) Series

 * SECTORS
 * Education: University
 * Hospitals & Medical Centers
 * Critical Infrastructure
 * More

 * EVENTS
 * Industry Events
 * Webinars
 * Solutions by Sector
 * Security 500 Conference

 * MORE
 * Call for Entries
 * Classifieds & Job Listings
 * Continuing Education
 * Featured Products
 * Newsletter
 * Sponsor Insights
 * Store
 * White Papers

 * EMAG
 * eMagazine
 * This Month's Content
 * Advertise

Security Magazine logo
search
Search search close search

cart
facebook twitter linkedin youtube
 * Sign In
 * Create Account
 * Sign Out
 * My Account


Security Magazine logo
 * NEWS
   * Security Newswire
   * Technologies & Solutions
 * MANAGEMENT
   * Leadership Management
   * Enterprise Services
   * Security Education & Training
   * Logical Security
   * Security & Business Resilience
   * Profiles in Excellence
 * PHYSICAL
   * Access Management
   * Fire & Life Safety
   * Identity Management
   * Physical Security
   * Video Surveillance
   * Case Studies (Physical)
 * CYBER
   * Cybersecurity News
   * More
 * BLOG
 * COLUMNS
   * Cyber Tactics
   * Leadership & Management
   * Security Talk
   * Career Intelligence
   * Leader to Leader
   * Cybersecurity Education & Training
 * EXCLUSIVES
   * Annual Guarding Report
   * Most Influential People in Security
   * The Security Benchmark Report
   * The Security Leadership Issue
   * Top Guard and Security Officer Companies
   * Top Cybersecurity Leaders
   * Women in Security
 * MEDIA
   * Videos
     * Cybersecurity & Geopolitical Discussion
     * Ask Me Anything (AMA) Series
   * Podcasts
   * Polls
   * Photo Galleries
 * SECTORS
   * Education: University
   * Hospitals & Medical Centers
   * Critical Infrastructure
   * More
 * EVENTS
   * Industry Events
   * Webinars
   * Solutions by Sector
   * Security 500 Conference
 * MORE
   * Call for Entries
   * Classifieds & Job Listings
   * Continuing Education
   * Featured Products
   * Newsletter
   * Sponsor Insights
   * Store
   * White Papers
 * EMAG
   * eMagazine
   * This Month's Content
   * Advertise
 * SIGN UP!


CybersecuritySecurity NewswireCybersecurity NewsHospitals & Medical Centers


YOUNG CONSULTING AND BLUE SHIELD OF CALIFORNIA ANNOUNCE DATA BREACH

By Security Staff


Image via Unsplash

September 3, 2024


Young Consulting announced a data breach affecting Blue Shield of California
subscribers in late August 2024.

Young Consulting revealed that an unauthorized actor gained access to its
computer network in April 2024 and downloaded copies of certain files. Young
Consulting determined that this data belonged to Blue Shield of California
subscribers.



Young Consulting has informed Blue Shield of California subscribers that the
following private information may have been stolen in the breach: names, Social
Security numbers, dates of birth, and insurance claim information.




KEYWORDS: data breach data breach notification health care security personal
health information security personally identifiable information (PII)


SHARE THIS STORY



Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!






1 COMPLIMENTARY ARTICLE(S) LEFT



Already Registered? Sign in now.


RESTRICTED CONTENT

You must have JavaScript enabled to enjoy a limited number of articles over the
next 30 days.

Please click here to continue without javascript..
Subscribe For Free!
 * Security eNewsletter & Other eNews Alerts
 * eMagazine Subscriptions
 * Manage My Preferences
 * Online Registration
 * Mobile App
 * Subscription Customer Service

--------------------------------------------------------------------------------


THE MONEY LAUNDERING MACHINE: INSIDE THE GLOBAL CRIME EPIDEMIC - EPISODE 24


SECURITY’S TOP 5 – JUNE 2024


SECURITY’S TOP 5 – JULY & AUGUST 2024


MIDDLE EAST ESCALATION, HUMANITARIAN LAW AND DISINFORMATION – EPISODE 25

prevnext

More Videos

--------------------------------------------------------------------------------





SPONSORED CONTENT

Sponsored Content is a special paid section where industry companies provide
high quality, objective, non-commercial content around topics of interest to the
Security audience. All Sponsored Content is supplied by the advertising company
and any opinions expressed in this article are those of the author and not
necessarily reflect the views of Security or its parent company, BNP Media.
Interested in participating in our Sponsored Content section? Contact your local
rep!

close
 * Sponsored byAMAROK
   
   
   HOW MULTI-SITE RISK ASSESSMENTS CAN GUIDE YOUR SECURITY INVESTMENTS PORTLAND
   MAINE TO PORTLAND OREGON

 * Sponsored byRed Hat
   
   
   MAXIMIZING BUSINESS BENEFITS WITH ROBUST HYBRID CLOUD SECURITY

 * Sponsored byAxis
   
   
   MODERNIZING RETAIL TECHNOLOGY OPERATIONS TO IMPROVE BUSINESS EFFICIENCY


POPULAR STORIES


68% OF HEALTHCARE WORKERS EXPERIENCED A SUPPLY CHAIN ATTACK


THE 2024 SECURITY BENCHMARK REPORT


93% OF HACKERS BELIEVE ENTERPRISE AI TOOLS CREATE A NEW ATTACK VECTOR


67% OF ORGANIZATIONS SAY EMPLOYEES LACK BASIC SECURITY AWARENESS


IRANIAN CYBER ACTORS ARE TARGETING CRITICAL INFRASTRUCTURE ENTITIES


SECURITY MAGAZINE IS LOOKING TO FEATURE INDIVIDUALS THAT ARE SHOWCASING
EXCELLENCE WITHIN THE SECURITY INDUSTRY!

Recognize security excellence—nominate today!


EVENTS

March 14, 2024


BALANCING ACT: NAVIGATING SECURITY TECH IN NONPROFIT ENTERTAINMENT SECTORS

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety
Operations at Toledo Zoo, will share her insights on implementing security
technologies in the entertainment sector and the challenges all organizations
face — large and small — when it comes to balancing budget and security. 

March 19, 2024


ENHANCE DIGITAL FORENSICS WITH STREAMLINED ANALYSIS AND IN-DEPTH INVESTIGATIONS

ON DEMAND: Explore the latest developments in digital forensics with an in-depth
look at FTK 8.

View All Submit An Event


PRODUCTS


SECURITY CULTURE: A HOW-TO GUIDE FOR IMPROVING SECURITY CULTURE AND DEALING WITH
PEOPLE RISK IN YOUR ORGANISATION

See More Products


FEATURED PRODUCT FROM ROHDE & SCHWARZ



Protecting people and assets with the R&S®QPS advanced technology security
scanners

READ MORE!


RECOMMENDED ARTICLES


 * SECURITY'S TOP CYBERSECURITY LEADERS 2024
   
   See More


 * ASSESSING THE PROS AND CONS OF AI FOR CYBERSECURITY
   
   See More


 * THE INTERSECTION OF CYBERSECURITY AND ARTIFICIAL INTELLIGENCE
   
   See More


RELATED ARTICLES


 * 63,341 CUSTOMERS IMPACTED IN BLUE SHIELD OF CALIFORNIA DATA BREACH
   
   See More


 * LISA DAVIS NAMED CHIEF INFORMATION OFFICER OF BLUE SHIELD OF CALIFORNIA
   
   See More


 * 23ANDME ANNOUNCE DATA BREACH
   
   See More


RELATED PRODUCTS

See More Products


 * THE DATABASE HACKER'S HANDBOO

See More Products
×




SIGN-UP TO RECEIVE TOP MANAGEMENT & RESULT-DRIVEN TECHNIQUES IN THE INDUSTRY.


JOIN OVER 20,000+ INDUSTRY LEADERS WHO RECEIVE OUR PREMIUM CONTENT.

SIGN UP TODAY!
 * RESOURCES
   * Advertise
   * Contact Us
   * Store
   * Want More
 * SIGN UP TODAY
   * Create Account
   * eMagazine
   * eNewsletter
   * Customer Service
   * Manage Preferences
 * SERVICES
   * Marketing Services
   * Reprints
   * Market Research
   * List Rental
   * Survey And Sample
 * STAY CONNECTED
   * LinkedIn
   * Facebook
   * YouTube
   * X (Twitter)
 * PRIVACY
   * PRIVACY POLICY
   * TERMS & CONDITIONS
   * DO NOT SELL MY PERSONAL INFORMATION
   * PRIVACY REQUEST
   * ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
Search search close search

cart
facebook twitter linkedin youtube
 * Sign In
 * Create Account
 * Sign Out
 * My Account





Security Magazine logo
 * NEWS
   * Security Newswire
   * Technologies & Solutions
 * MANAGEMENT
   * Leadership Management
   * Enterprise Services
   * Security Education & Training
   * Logical Security
   * Security & Business Resilience
   * Profiles in Excellence
 * PHYSICAL
   * Access Management
   * Fire & Life Safety
   * Identity Management
   * Physical Security
   * Video Surveillance
   * Case Studies (Physical)
 * CYBER
   * Cybersecurity News
   * More
 * BLOG
 * COLUMNS
   * Cyber Tactics
   * Leadership & Management
   * Security Talk
   * Career Intelligence
   * Leader to Leader
   * Cybersecurity Education & Training
 * EXCLUSIVES
   * Annual Guarding Report
   * Most Influential People in Security
   * The Security Benchmark Report
   * The Security Leadership Issue
   * Top Guard and Security Officer Companies
   * Top Cybersecurity Leaders
   * Women in Security
 * MEDIA
   * Videos
     * Cybersecurity & Geopolitical Discussion
     * Ask Me Anything (AMA) Series
   * Podcasts
   * Polls
   * Photo Galleries
 * SECTORS
   * Education: University
   * Hospitals & Medical Centers
   * Critical Infrastructure
   * More
 * EVENTS
   * Industry Events
   * Webinars
   * Solutions by Sector
   * Security 500 Conference
 * MORE
   * Call for Entries
   * Classifieds & Job Listings
   * Continuing Education
   * Featured Products
   * Newsletter
   * Sponsor Insights
   * Store
   * White Papers
 * EMAG
   * eMagazine
   * This Month's Content
   * Advertise
 * SIGN UP!




COOKIES AT BNP MEDIA

This BNP Media website uses cookies to enhance user experience and to analyze
performance and traffic on our site. By clicking “Accept All Cookies”, we can
bring you the best experience we have to offer. If you'd like to take the time
to set which cookies we can use, click 'Manage your Cookies'.



If you are a registered visitor you will need to accept all cookies to have the
targeted experience you desire.



View our Privacy Policy
ACCEPT ALL COOKIES Reject All
Manage your Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies.



This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not
usually directly identify you, but it can give you a more personalized web
experience. Because we respect your right to privacy, you can choose not to
allow some types of cookies.



Click on the different category headings to find out more and change our default
settings. However, blocking some types of cookies may impact your experience of
the site and the services we are able to offer.



If you are a registered visitor you will need to accept all cookies to have the
targeted experience you desire.




BNP Media Privacy PolicyCookie List
Allow All


MANAGE CONSENT PREFERENCES

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices