Insurance data violation exposes confidential information of 1.6 million people

Insurance data violation exposes confidential information of 1.6 million people

Unique News to access this content

You have reached its maximum number of articles. Log in or create an account for free to continue reading.

When you enter your email and press continue, you accept the terms of use and the privacy policy of News, which includes our financial incentive notice.

Please enter a valid email address.

If there is something that I have learned by covering data violations over the years, it should never take the initial numbers of a company to nominal value. When a violation becomes public, most companies try to minimize damage by informing less victims or staying vague about what type of data were exposed.

Sometimes, to be fair, they really don’t have the complete image yet. But that rarely communicates clearly. The same happened again with an Insurtech company that has now doubled the number of people affected by a violation that revealed last year.

Stay protected and informed! Get security alerts and expert technology advice: register at the ‘The Cyberguy Report’ of Kurt now

Insurance data violation exposes confidential information of 1.6 million people

A woman who works on her laptop (Kurt “Cyberguy” Knutsson)

What you need to know

The Texas -based administrative service provider, Landmark Admin, has reviewed the scope of its May 2024 cyber attack, revealing that almost twice as many people were affected that initially reported. In October 2024, Landmark revealed that suspicious activities were detected in his network on May 13, which caused an investigation. At the moment, It was estimated that the violation affected 806,519 individuals. But in a recent update presented to the Office of the Attorney General of Maine, that number has now increased to 1,613,773.

Landmark serves as an external administrator who offers backend support to the main insurers such as Libekers Life and American Benefit Life. This means that millions of sensitive insurance policy records flow through their systems, which makes it a tempting target for cybercriminals.

The compromised information varies for each individual, but may include a wide range of confidential personal data. This includes full names, housing addresses, social security numbers, tax identification numbers, driver’s license or identification numbers issued by the State, passport numbers and bank account details. In some cases, medical information, birth dates, health insurance policies and details related to life and annuity policies may also have been exposed.

Insurance data violation exposes confidential information of 1.6 million people

A hacker at work (Kurt “Cyberguy” Knutsson)

200 million social media records filtered in data violation x Major X

What is Landmark doing now?

The company says that forensic research is still ongoing and that the total number of people affected can continue to increase. Custom notification letters are being sent by mail in phases, which details exactly what type of data were compromised in each case.

“Landmark began reviewing the affected systems to identify specific people and types of information that may have been compromised,” Read the last notice. “While this process remains ongoing, Landmark will notify people affected by mail as the information is available.”

To help mitigate the consequences, Landmark offers 12 months of free credit monitoring and identity theft protection. The notice also advises the recipients to supervise their credit reports and consider placing fraud alerts or a security freezing to obtain additional protection. A dedicated help line is available for 90 days after notification to address questions and concerns.

Insurance data violation exposes confidential information of 1.6 million people

A man who works on his laptop and displacing on his phone (Kurt “Cyberguy” Knutsson)

Malware exposes 3.9 billion passwords in a great threat of cybersecurity

6 ways in which you can keep safe from the violation of insurance data

If your information was part of historical or similar violation, it is worth taking some steps to protect yourself.

1) Consider identity theft protection services: Since the violation of historical data presented personal and financial information, it is crucial to remain proactive against identity theft. Identity theft protection services offer continuous monitoring of their credit reports, the social security number and even the dark website to detect if your information is being used badly. These services send you real time alerts about suspicious activities, such as new credit consultations or attempts to open accounts in your name, helping you act quickly before serious damage occurs.

Beyond monitoring, many identity robbery protection companies provide dedicated recovery specialists who help him solve fraud problems, disputing unauthorized positions and restoring his identity if he is committed. They often include up to $ 1 million to cover legal fees and fees and a white glove fraud resolution team in which a case manager based in the United States helps him recover any loss. See my advice and the best selections on how to protect yourself from identity theft.

2) Monitor your accounts and transactions: The violation of historical data revealed the bank data to the attackers, which means that they can misuse those details to steal their money. You must consult your accounts and transactions online regularly to obtain any suspicious or unauthorized activity. If you notice something unusual, I immediately report it to the service provider or authorities. You must also review your credit and scores reports to see if there are signs of robbery or identity fraud.

3) Communicate with your bank and credit card companies: Since historical computer pirates obtained banking and credit card information, they could use it to make purchases or retreats without their consent. You must inform your bank and the credit card companies of the situation. They can help you freeze or cancel your cards, play any fraudulent position and issue new cards for you. You must also communicate with one of the three main credit reports (Equifax, Experian or Transunion) and request a fraud alert to be placed in your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.

4) Use personal data removal services: Data violation filters a lot of information about you, and all this could end in the public domain, which essentially gives anyone the opportunity to cheat it. A proactive step is to consider personal data removal services, which specialize in monitoring and continuously eliminate their information from various databases and online websites. While no service promises to eliminate all its Internet data, having an elimination service is excellent if you want to constantly monitor and automate the process of eliminating your information from hundreds of sites continuously for a longer period of time. See my best selections to obtain data removal services here.

5) Have a strong antivirus software: Landmark computer pirates have email addresses and full names of people, which makes it easier for them to send a phishing link that installs malware and steals all their data. These messages are socially designed to catch them, and catch them is almost impossible if you are not careful. However, you are not without defenses.

The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have strong antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.

6) enable two factors authentication: While passwords were not part of data violation, you must still enable of two factors authentication (2FA). It gives you an additional security layer in all its important accounts, including email, banking and social networks. 2FA requires that you provide a second information, as a code sent to your phone, in addition to your password when you logged in. This makes it significantly more difficult for computer pirates to access their accounts, even if they have their password. Enable 2FA can greatly reduce the risk of unauthorized access and protect your confidential data.

Windows 10 security defects leave millions vulnerable

Kurt key takeway

The real risk with violations like this is not only the initial leakage. It is the slow drip of the consequences that follow. As more names and numbers arise, the consequences become more difficult to contain, and affected people let themselves fight to protect themselves. Landmark’s delayed clarity is a reminder that in the world of cyber attacks, deadlines rarely work in favor of the public. By the time the complete image arises, the damage can be done.

Do you think companies are investing enough in their cybersecurity infrastructure? Get us knowing in Cyberguy.com/contact.

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.

Ask Kurt a question or let us know what stories we would like to cover.

Follow Kurt in his social channels:

  • Facebook
  • YouTube
  • Instagram

Answers to the most informed Cyberguys questions:

  • What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
  • What is the best way to stay private, safe and anonymous while navigating the web?
  • How can I get rid of robocalls with data elimination applications and services?
  • How do I eliminate my private internet data?

New Kurt:

  • Try the new Cyberguy games (crosswords, words searches, trivia and more!)
  • Cyberguy exclusive coupons and offers
  • The best gifts for mom 2025

Copyright 2025 Cyberguy.com. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *