You are here:---Security

Getting back to the basics of online security and privacy: Protect your personal information

We recently introduced our six-part series focused on getting back to the basics of online security and privacy. These six fundamentals reinforce that, even in today’s tech-centric world, the basics of staying cyber secure are not scary. They’re not really all that technical, and anyone who uses an internet-connected device is able to make a

By |2018-07-26T08:38:39-05:00July 25th, 2018|Categories: Security|Tags: , , , , , , , , |Comments Off on Getting back to the basics of online security and privacy: Protect your personal information

Getting back to the basics of online security and privacy

Blue Cross and Blue Shield of Nebraska continually works to ensure the security and privacy of our computers, networks and sensitive information. Since people–not computers–are often the target of hackers, we want to educate you by posting a series of articles that reinforces how to stay safe online. Being cyber secure means doing these six

By |2018-07-05T16:28:53-05:00July 2nd, 2018|Categories: Security|Tags: , , , , , , , , , , , , , |Comments Off on Getting back to the basics of online security and privacy

Tips to keep kids safe online during summer break

As the school year comes to a close, kids are going to discover they have a lot of free time on their hands. Chances are, a great deal of their time will be spent online. This summer, look at online safety and privacy as one component of an overall summer family plan. Mix online time

By |2018-05-22T13:09:03-05:00May 22nd, 2018|Categories: Security|Tags: , , , , , , , , , |Comments Off on Tips to keep kids safe online during summer break

Practice: Preparing for potential cyberattacks

Before any big event, it makes good sense to practice ahead of time to make sure everything runs smoothly. The more you rehearse, the more thoroughly everyone involved knows their roles and responsibilities, and can plan for every possible scenario. Weddings, theatrical performances, speeches, school or work presentations—everyone would likely agree that practice makes perfect

By |2018-04-16T16:00:35-05:00April 13th, 2018|Categories: Security, Stories, Topics|Tags: , , , , , , |Comments Off on Practice: Preparing for potential cyberattacks

New Medicare ID cards being mailed

In April 2018, the Centers for Medicare & Medicaid Services (CMS) will begin a year-long process of mailing new ID cards to everyone covered by Medicare. CMS will mail the new cards by geographic location and other factors, with the goal of having all cards replaced by April 2019. For people in Iowa and Nebraska

By |2019-08-07T10:02:54-05:00March 29th, 2018|Categories: Security|Tags: , , , , , , , , , , |Comments Off on New Medicare ID cards being mailed

Tax time: Stay safe from cybercrime

Tax season is prime time for online scams. Cybercriminals are looking to cash in by stealing your identity and by getting their hands on your tax refund. Already this year, reports of tax-related cybercrime and privacy breaches are popping up across the country. Here in the Midwest, for example, the City of Keokuk, Iowa, fell

By |2018-02-27T15:27:57-05:00February 27th, 2018|Categories: Security|Tags: , , , , , , , , , , , |Comments Off on Tax time: Stay safe from cybercrime

Phishing messages: Don’t get hooked

Generally speaking, cyber criminals are fairly smart people—they usually take the path of least resistance to get their hands on whatever they want to steal. That’s why they continue to rely less on hacking computer systems, and more on something called social engineering -- especially phishing. Think of social engineering as hacking a person rather

By |2018-02-26T15:08:19-05:00February 26th, 2018|Categories: Security|Tags: , , , , , , , , , , |Comments Off on Phishing messages: Don’t get hooked

Out with the old, in with the new: how to securely get rid of that old computer

If you’re thinking about buying a new computer, you may be wondering what to do with your old one: do you toss it, let someone else in the family use it, or just hide it in the closet? Well, whichever you decide, there are some important things to know, and do, to ensure the security

By |2017-12-20T10:26:49-05:00December 19th, 2017|Categories: Security|Tags: , , , , , , , , , , |Comments Off on Out with the old, in with the new: how to securely get rid of that old computer

A cyber secure holiday season: Tweens, teens and technology

‘Tis the season for many tweens and teens to receive their first smartphone, tablet or other internet-connected device. When giving the gift of tech, parents should also do what they can to give the gift of online safety. While most young people have grown up with technology and are comfortable navigating their online lives, a

By |2017-12-20T10:27:56-05:00December 19th, 2017|Categories: Security|Tags: , , , , , , , , , , , |Comments Off on A cyber secure holiday season: Tweens, teens and technology

Identity theft may impact your medical care

High-profile data breaches are making headlines, and affected consumers are no-doubt on high alert when it comes to their credit, banking, and brokerage accounts—but have you thought about the relation between identity theft and medical care? According to the Federal Trade Commission, medical identity theft occurs when a thief uses “your name or health insurance

By |2017-12-14T12:14:26-05:00November 21st, 2017|Categories: Security|Tags: , , , , , , , , |Comments Off on Identity theft may impact your medical care