• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Boost IT

Boost IT

Managed IT Services, Cybersecurity, & Cloud

  • SERVICES & SOLUTIONS
    • IT MANAGEMENT >
      • Take an IT Self-Assessment
      • IT Assessment
      • 24/7 Help Desk Support
      • Managed IT Support
      • Mobile Workforce
      • Software Updates
      • Remote Server Monitoring
      • Wi-Fi
    • IT SECURITY >
      • Take a Cybersecurity Self-Assessment
      • Cybersecurity Assessment
      • Endpoint Detection & Response
      • Multi-Factor Authentication (MFA / 2FA)
      • Security Operations Center (SOC) Support
      • HeatShield Perimeter Firewall
    • IT CONSULTING >
      • IT Insight & Ongoing Guidance
      • vCIO – Virtual CIO
    • CLOUD >
      • Data Backup & Disaster Recovery
      • Microsoft Office 365 & E-mail
      • Cloud File-Sharing Platform
      • Business Phone System
    • Frequently Asked Questions
  • OUR CLIENTS
    • Engineering
    • Financial Services
    • Healthcare
    • Real Estate Development
    • Projects
    • Testimonials
    • Transition to Boost IT
  • OUR TEAM
    • One IT Question
    • Our Proven Process
    • Our Partners
  • BLOG
  • CONTACT
    • Book a Meeting
    • Client Portal
    • Remote Support
You are here: Home / Cyber Security / How Was Anthem Hacked?

How Was Anthem Hacked?

February 15, 2015 by Boost IT

One malware infected computer can cripple an entire business.

How Was Anthem Hacked?

And How You Protect Yourself and Your Business

It was Malware & other Tools

One malware infected computer can cripple an entire business.
Malware comes in many different forms.

I’m sure you’ve heard Anthem was hacked (Blue Cross Blue Shield), and we’ve been asked numerous times “How Was Anthem Hacked?” According to this Wall Street Journal article, “the Anthem hack relied on malware and tools that have been used almost exclusively by Chinese cyberspies, investigators said.”
SurfWatch Lab’s Adam Meyer gives his own thoughts in more technical detail in this CIO Journal article.

What Else You Should Know

MalwareAnthem was hacked because of the amount of data they have, but even if you don’t store SSNs, malware can cripple small and mid-sized businesses, too. So we wrote 4 blog posts over the past month with easy to implement cyber security tips. A great security strategy keeps tangible and intangible costs down, protects your clients, co-workers or patients, and provides the most reliable access to your data. Boost IT’s strategy has worked very well for the past 15 years. Not one of our clients has gotten infected with the deadly Cryptolocker ransomware.

How To Protect Yourself or Your Business

If you are an Anthem customer and need info on how to protect your identity, see Clark Howard’s ‘What You Need To Know’ Post.

Individuals and businesses of all sizes need a great security strategy, which has 4 parts. We created a post for each part. We’d love to hear your feedback so please leave comments.
Cyber Security Tips for SMBs : Part I (Anti-Malware) w/ Active Hacker Threat Map (Infographic)
Cyber Security Tips for SMBs : Part II (Firewall Solutions) w/ Cybersecurity resources for Small Business
Cyber Security Tips for SMBs : Part III (Still Need Anti-Virus?) w/ How Ransomware Spreads
Cyber Security Tips for SMBs : Part IV (Security Patches & Updates) w/ Software Names Included

Other Recent Posts:
The Value of a Hacked PC

Is Cyber Security a Social Responsibility?

keep-calm-and-support-cyber-securityWe are starting to realize that a Cyber Security strategy is not only to protect yourself and your business, but it also protects other individuals and businesses. Could it be called a social responsibility, even for small and mid-sized companies?

The more people that have this information the better individuals and businesses are protected, so please forward this to anyone that might benefit, or use share links at the end of this post.

Filed Under: Cyber Security, Healthcare

Connect With Us

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube

Footer

Next Steps

Start with the SOLUTIONS menu above.

Take an IT Self-Assessment.

Take a Cybersecurity Self-Assessment.

Read Case Studies about how we’ve helped our clients transform their companies.

View Testimonials from current clients.

Review some of our Projects.

Featured Posts

How To Choose a New Laptop

How To Create a Shared Calendar in Outlook & Microsoft 365

17 New Cyber Liability Insurance Questions Your Provider Will Ask

Atlanta Real Estate Firm Gets Ransomware

Why Hackers Target Small Businesses

Cloud File Sync and Share Provides Speed and Efficiency

Office Location

© 2000–2023 · Boost IT, LLC · Coverage Area

  • SERVICES & SOLUTIONS
  • OUR CLIENTS
  • OUR TEAM
  • BLOG
  • CONTACT