Helpful Hint: Department of Insurance & NIPR Contracting Info

As more carriers start to pull some of your information from the Department of Insurance and NIPR websites for contracting requirements, it is important to make sure this information is up-to-date! 

For instance, if you have not updated your business address & phone number, this incorrect information will be pulled over to the carrier you are appointing with.  Also, if you no longer work with a certain agency, but the State Department of Insurance shows that you do, it will still link you with that agency.

Please take the time to keep your information current and reach out to us if you have any questions- We are here to help!

TECH TIP: Company Size Doesn’t Matter

Think hackers are only trying to target large corporations for their cyber attacks? Think again! If you are an employee of a small to medium size business, you may have an even bigger bulls-eye placed on you by hackers.

Smaller businesses have recently become a bigger target for cyber attacks because the hackers know that they likely have fewer defense resources in place. According to the National Cyber Security Alliance, one in five small businesses falls victim to cyber crime each year. And of those, some 60 percent go out of business within six months of an attack.

Remember these tips to stay safe:

  • Never provide your password to anyone. Use complex passwords, and use different ones for each of your online accounts or programs.
  • Check for red flags in emails to tip you off that the sender may not be legitimate. Check domain names carefully.
  • Don’t open any email attachments if you don’t know exactly why you received them or what they contain.
  • When in doubt, throw it out. Hit that delete button.

Remember, you are the last line of defense to prevent a cyber attack. You are the key to keeping the “human firewall” strong for your organization, no matter the size.

Let’s stay safe out there!   Stop, Look, and Think.

NAHU’s Annual Convention 2019

NAHU’s 2019 Annual Convention in San Diego, from June 29-July 2, promises to be the most innovative, productive and fun meeting you’ve ever attended.

For example, on Saturday, June 29, Personal and Professional Development Day kicks off with a Health and Wellness Assembly, a morning devoted to improving your personal health and well-being. A lineup of innovative speakers will clarify what works and how it fits into daily life in a sustainable and integrative way. Be sure to arrive on Friday, June 28, as Saturday kicks off at 8:00 am and you won’t want to miss a thing!

Want to rise above your competitors? Saturday afternoon features an exciting new format that will deliver ideas you can implement in your business now. From retaining today’s new workforce and buying or selling your agency, to data transparency and alternative healthcare management, this cutting-edge program will provide fresh ideas that can be turned into practical solutions for your business.

An expanded Medicare Extreme! returns with proven practices and important trends on changes in Medicare, technology solutions, growing your business with group Medicare sales and more.

The day concludes with a Welcome Reception in The Marketplace, your opportunity to visit with a variety of vendors and network with colleagues.

 

For more information on the convention click here

TECH TIP: Confidential/Sensitive Information Handling

Confidential, Top Secret, Sensitive, For Internal Use Only
These terms apply to information both hard-copy and electronic that should be handled with care.
A lot of times, these designations apply to intellectual property, trade secrets, and security configurations.

Listed below are several things to keep in mind when dealing with confidential information.

Shred, Shred, Shred
Someone may hand you documents, or you may print out a file or email containing sensitive information.
Make sure that when you are done with it, that you shred-shred-shred these files instead of just placing them in the trash.
Things to keep in mind: Leaving printed files in the printer tray, meeting handouts, printed emails.
– Attackers will go through the trash and dumpsters to obtain these sensitive documents.

Tidy up
Take a look around your desk or office… how many documents do you have out and available for someone to grab, or view?
Be sure to keep a tidy workplace: put files away in locked drawers when not in use.
Would you leave the keys to your house outside the front door at night, or inside, locked away?
– Bad guys have been known to impersonate maintenance staff and cleaning crews to grab files off of desks after hours

Data and Files – Encryption and Secure deletion
Does your company give you a laptop to use? Is the data on that laptop encrypted? What about USB (thumb) drives that contain company files… are those encrypted? What would happen if that laptop or USB drive were to go missing, or even stolen? All those files could easily be read, copied, sold etc. Consider using encryption on sensitive files wherever they may be located. It becomes very difficult for attackers to read them if they are encrypted.

Sensitive information is the holy grail of an organization. If it were to be stolen or lost, the company is at risk of losing value, may suffer fines, and even public embarrassment. Treat your company’s data like you would your own social security number, credit card information, or healthcare information: with great care.

Let’s stay safe out there! Stop, Look, and Think.

GENETIC TESTING SCAMS: WHAT YOU NEED TO KNOW

Recently, the Centers of Medicare and Medicaid Services (CMS) has alerted carriers and the public of a scam designed to generate Medicare member referrals to genetic testing companies.

Cornerstone Senior Marketing cares about you and your client’s bet interest. This includes making sure you know what is and is not compliant. Read what some carriers have to say about this fraudulent scam:

If you have any questions please reach out to your CSM representative! We are here to help.

TECH TIP: “Safe” Email Attachments

You may already be aware that you should not open email attachments with an extension such as “.exe”, but did you know that even PDFs or Word Documents can be rendered unsafe to open? Opening these attachments from senders with malicious intent can cause your computer (and any networks to which you are connected) to be compromised, hacked or even riddled with ransomware.

What are the unsafe file types to look out for?  This question is better answered by listing file types that are generally considered to be safe to open. The truth is that most file types are at risk of being “booby-trapped” to attack your computer or device. The general rule is to NEVER open any email attachment if you do not know who it came from or why you received it

You should always be on guard with any email attachments that are not .TXT files. 

How can I tell if an attachment is safe to open?

  • Ask yourself: Was I expecting to receive this attachment, and did it come from who I would expect it to come from? Check email addresses for any “red flags” that may indicate the email address has been spoofed or faked.
  • Never open an email attachment if you don’t recognize the sender that it came from.
  • If you recognize the person or email address sending you the file, but it was still unexpected, contact them first through a different form of communication (such as by phone) to ask them if they intended to send you the file.

Let’s stay safe out there!

Stop, Look, and Think.

 

Reporting Fraud, Waste, and Abuse

Cornerstone employees and broker partners are required to report suspected Fraud, Waste and Abuse. You can report Fraud, Waste and Abuse to Cornerstone’s Tim Shook at 513-629-9505 or email tshook@crnstone.com. Additionally, you can report suspected Fraud, Waste or Abuse anonymously via the following Plan Sponsor hotlines:

Aetna: 1-860-273-3586

MMO: 1-800-762-8130

UnitedHealthcare: 1-877-401-9430

Humana: 1-800-614-4126

Paramount: 1-800-462-3589

Premier: 1-888-271-2688

Anthem: 1-800-203-3738