For Members in Cook, Kane, Lane and McHenry Counties
In accordance with Company Bulletin 2017-03 issued by the Illinois Department of Insurance, the following safeguards have been implemented for Aetna and Coventry members that reside in the affected counties:
The Illinois Department of Insurance (DOI) is available for filing complaints about disaster-related disputes or issues.
May 2017
Several media outlets published May 12 reports on an aggressive form of ransomware that has affected organizations in many countries.
We understand from these media reports that the attacks have had particular effects on health care organizations, including 16 National Health Service (NHS) facilities in the United Kingdom. These reports also indicated that some of the affected facilities canceled outpatient appointments and informed people to avoid emergency departments if possible.
According to media reports, this ransomware, called "WannaCry" or “Wanna Decryptor,” encrypts the files on an infected computer and then demands the payment of $300 in the form of the cryptocurrency Bitcoin in order to obtain the decryption key and regain control of the files. After three days, the amount of Bitcoin demanded by the ransomware increases to $600. Ultimately, the ransomware threatens to delete the files if payment is not made within seven days.
Our response
For more information
News updates on the ransomware attack
November 2015
Aetna has become aware of impostors who are calling people – often multiple times a day – and fraudulently claiming to be from Aetna. The calls may be from an automated service that repeatedly dials a number, or from a live person. Aetna is not placing these calls, or directing others to place them.
By falsely claiming to represent Aetna, one of our companies or any other reputable company, these scam artists want to trick you into
This form of fraud is called "phishing" and it is illegal.
Often, the people making these fake calls will talk about a new service that Aetna is providing. The service requires a health assessment. The person offers to send someone to your home to complete the assessment and send the results to your doctor.
The imposters have called cell phones as well as land lines. We cannot warn you about certain phone numbers to look for on caller ID. The phone numbers are always different. But they often have local area codes.
What to do with a suspicious call
If you have any suspicions about a call or caller –
Suspicious numbers
Two suspicious telephone numbers that have come to our attention are 571-441-0062 and 970-999-7057. These numbers are not from Aetna or any vendor working for Aetna.
Spoofing Your Number
Aetna also has received reports that legitimate business owners have received calls from scam artists who say they represent Aetna. After that, the telephone number of that legitimate business starts cropping up on the caller IDs of other people who receive calls from these same scam artists. The technology to fake a caller ID is called "spoofing," and it is a way to disguise the source of the incoming call.
Aetna does not "spoof" the numbers of our customers or potential customers. If your number has been spoofed, report it to the local fraud unit of your telephone company and the Federal Trade Commission.
If You Think You've Been Scammed
If you believe you are a victim of a phishing scam, act quickly. Contact your bank or credit-card company immediately to report your suspicions. In many instances, you can ask them to impose password protection on your accounts. This prevents the unauthorized release of funds. If necessary, report any loss of funds to your bank, the police, and the Federal Trade Commission.
Legitimate Aetna Calls
Aetna complies with the law when making calls to our members and business associates. We may need more information about a claim, for example, or we may be reaching out as part of our care management programs. If you are suspicious of giving information to someone who says they are from Aetna, hang up and call the Member Services number on your ID card. Ask to have your call directed to the department that was asking for the information. That way, you can be sure you are giving the information to Aetna.
January 2015
Qualys recently disclosed a flaw, known as GHOST, within the Linux operating system. The vulnerability could allow a skilled attacker to add malicious code to a system without authorization.
Aetna has thoroughly assessed our environment and is currently patching impacted system components. We do not believe that any of our systems or customer data have been compromised as a result.
We will continue to monitor our systems to protect our member, plan sponsor and provider data. We also have remediation plans in place, so we can quickly address any issues we find. Finally, we are working with all suppliers and vendors to assure that their systems are protected.
Members, providers and plan sponsors do not need to take any action to protect their Aetna data. However, it’s always a good practice to routinely change passwords.
November 2014
Microsoft recently announced the MS14-066 Schannel security flaw. Schannel is used by Windows client and server operating systems. Aetna has thoroughly assessed our systems. We do not believe that any of our systems or customer data has been compromised as a result.
We have patched all internal and external systems. We’ll continue to monitor our systems to protect our member, plan sponsor and provider data. We also have remediation plans in place, so we can quickly address any issues we find. Finally, we worked with all suppliers and vendors to assure that their systems are protected.
September 2014
Experts recently disclosed a software bug in a utility that is commonly used in computers, servers and even smartphones and other Internet-connected devices, called ShellShock.
Aetna immediately assessed our exposure. We’ve implemented security controls to guard against this vulnerability, and have patched all critical systems involved in the processing of customer data. Our security experts continue to analyze system and data components to assure the continued protection of our member, plan sponsor and provider data.
In addition to addressing our own infrastructure, we are diligently working through every third-party vendor relationship to identify potential exposures, then working closely with our vendor partners to assure the remediation of the vulnerability.
We are confident in the proactive steps we have taken since learning of this vulnerability on September 25.
June 2014
Your laptop allows you to work while being mobile. However, without proper security practices, your laptop is very susceptible to being lost or stolen. Besides the financial cost of replacing a laptop, the consequences of a lost or stolen device can include:
If at all possible, do not store customer sensitive data (member SSN) on your device. Our customer information must be protected at all times and should only be used and/or stored when absolutely necessary.
Encrypting the hard drive of your device is the best practice to secure its data. Recommended encryption tool options are:
Whether you are in the office or teleworking, follow these steps to protect your laptop:
Keep your device with you at all times and do the following:
Record the laptop’s serial number and store it in a safe place, such as your wallet. This will facilitate recovery efforts and identify you as the owner of the laptop if it is lost or stolen.
If your laptop is stolen or lost on which you were conducting Aetna business, immediately notify the SPOC (Single Point of Contact) at (888) 905-9500.
April 2014
The recently announced “Heartbleed” vulnerability impacts a piece of software known as OpenSSL – a common software package used to assure the secure communication of data across the internet.
Like many organizations, Aetna has been working diligently to assess the impact of Heartbleed on our customers and information systems. To date we have determined that our core customer-serving and external facing systems are not impacted.
We have also instituted remediation plans to assure that we quickly address any vulnerable systems, should they be identified. We will take other precautions as necessary to protect customer data. In addition to assessing our own infrastructure, we are diligently evaluating third-party vendor appliances and applications that may be impacted. We will work closely with any impacted vendors to monitor remediation of the vulnerability.
We initiated these proactive steps following the announcement of this vulnerability on April 7.
In order to have the best experience on Aetna.com, Javascript needs to be enabled.
Learn how to change your browser settings to enable Javascript.