Compliance Communication From Humana

Humana has been notified of two issues with Medicare Plan Finder on  These are not limited to Humana plans and appears to impact other carriers as well.  Humana has notified CMS of the issue and are awaiting their response.  The issues are related to mail order pharmacies not displaying correctly on the Medicare Plan Finder’s newly redesigned website:

  1. is not providing preferred mail order pricing or giving an option to view the preferred mail order pricing when beneficiaries click “Review Plan Details”.
  2. When a beneficiary selects that they use both retail and mail order pharmacies, mail order pharmacies do not appear in the results.

In the meantime, Humana is asking agents and prospective members to use Humana’s Rx Calculator tool for mail order pricing information found at the following URL’s:


Prospective member:

Tech Tip: Hovering Over Links

How can you tell if an email is safe? Even if you catch red flags in an email, such as typos or poor grammar, an urgent demeanor, or even a spoofed domain, how can you truly decipher the safety of an email?

An immediate step you can take is to watch out for one of the most critical tell-tale signs of a phishing email—a mismatched or fake URL.

Why is hovering important? What can it do for you?
Hovering not only allows you a moment to think before proceeding, it allows you the opportunity to see where a link is going to redirect you. This is especially important because not all links lead to where they appear, or insinuate they’ll go.

When you hover, check for the following to ensure you’re staying safe and secure:

  • If the email appears to be coming from a company, does the hover link match the website of the sender?
  • Does link have a misspelling of a well-known website (Such as
  • Does the link redirect to a suspicious external domain appearing to look like the sender’s domain(i.e., rather than
  • Does the hover link show a URL that does not match where the context of the email claims it will take you?
  • Do you recognize the link’s address or did you even expect to receive the link?
  • Did you receive a blank email with long hyperlinks and no further information or context?

If you notice anything about the email that alarms you, do not click links, open attachments, or even reply. If everything seems okay, but you’re still not sure–verify! Ask your IT team or leadership if the email is legitimate before proceeding.

Remember, you are the last line of defense to prevent cyber criminals from succeeding and making you or your company susceptible to an attack.


Let’s stay safe out there!

NAIC Phishing Scam Alert: Please Read!

Cornerstone Senior Marketing would like to inform you of a phishing email scam that is being addressed by the National Association of Insurance Commissioners. The scam is targeting insurance producers regarding a falsified insurance claim related to their company that has been submitted to the National Association of Insurance Commissioners (NAIC).

Full statement taken from NAIC’s Website:

We are aware of a phishing scam targeting insurance producers regarding a falsified insurance claim related to their company that has been submitted to the National Association of Insurance Commissioners. This fraudulent email displays the NAIC and CIPR logo , can originate from a gmail account and asks the recipient to click on a link to download the complaint notification. 

Certain anti-virus products will detect this is a malicious email, but if you receive a similar email and have any concerns contact the NAIC Service Desk at 816.783.8500 or


View sample email from an actual broker


If you have any questions or concerns, contact your Cornerstone Senior Marketing Sales representative. 


Helpful Hint: Department of Insurance & NIPR Contracting Info

As more carriers start to pull some of your information from the Department of Insurance and NIPR websites for contracting requirements, it is important to make sure this information is up-to-date! 

For instance, if you have not updated your business address & phone number, this incorrect information will be pulled over to the carrier you are appointing with.  Also, if you no longer work with a certain agency, but the State Department of Insurance shows that you do, it will still link you with that agency.

Please take the time to keep your information current and reach out to us if you have any questions- We are here to help!

TECH TIP: Company Size Doesn’t Matter

Think hackers are only trying to target large corporations for their cyber attacks? Think again! If you are an employee of a small to medium size business, you may have an even bigger bulls-eye placed on you by hackers.

Smaller businesses have recently become a bigger target for cyber attacks because the hackers know that they likely have fewer defense resources in place. According to the National Cyber Security Alliance, one in five small businesses falls victim to cyber crime each year. And of those, some 60 percent go out of business within six months of an attack.

Remember these tips to stay safe:

  • Never provide your password to anyone. Use complex passwords, and use different ones for each of your online accounts or programs.
  • Check for red flags in emails to tip you off that the sender may not be legitimate. Check domain names carefully.
  • Don’t open any email attachments if you don’t know exactly why you received them or what they contain.
  • When in doubt, throw it out. Hit that delete button.

Remember, you are the last line of defense to prevent a cyber attack. You are the key to keeping the “human firewall” strong for your organization, no matter the size.

Let’s stay safe out there!   Stop, Look, and Think.

NAHU’s Annual Convention 2019

NAHU’s 2019 Annual Convention in San Diego, from June 29-July 2, promises to be the most innovative, productive and fun meeting you’ve ever attended.

For example, on Saturday, June 29, Personal and Professional Development Day kicks off with a Health and Wellness Assembly, a morning devoted to improving your personal health and well-being. A lineup of innovative speakers will clarify what works and how it fits into daily life in a sustainable and integrative way. Be sure to arrive on Friday, June 28, as Saturday kicks off at 8:00 am and you won’t want to miss a thing!

Want to rise above your competitors? Saturday afternoon features an exciting new format that will deliver ideas you can implement in your business now. From retaining today’s new workforce and buying or selling your agency, to data transparency and alternative healthcare management, this cutting-edge program will provide fresh ideas that can be turned into practical solutions for your business.

An expanded Medicare Extreme! returns with proven practices and important trends on changes in Medicare, technology solutions, growing your business with group Medicare sales and more.

The day concludes with a Welcome Reception in The Marketplace, your opportunity to visit with a variety of vendors and network with colleagues.


For more information on the convention click here

TECH TIP: Confidential/Sensitive Information Handling

Confidential, Top Secret, Sensitive, For Internal Use Only
These terms apply to information both hard-copy and electronic that should be handled with care.
A lot of times, these designations apply to intellectual property, trade secrets, and security configurations.

Listed below are several things to keep in mind when dealing with confidential information.

Shred, Shred, Shred
Someone may hand you documents, or you may print out a file or email containing sensitive information.
Make sure that when you are done with it, that you shred-shred-shred these files instead of just placing them in the trash.
Things to keep in mind: Leaving printed files in the printer tray, meeting handouts, printed emails.
– Attackers will go through the trash and dumpsters to obtain these sensitive documents.

Tidy up
Take a look around your desk or office… how many documents do you have out and available for someone to grab, or view?
Be sure to keep a tidy workplace: put files away in locked drawers when not in use.
Would you leave the keys to your house outside the front door at night, or inside, locked away?
– Bad guys have been known to impersonate maintenance staff and cleaning crews to grab files off of desks after hours

Data and Files – Encryption and Secure deletion
Does your company give you a laptop to use? Is the data on that laptop encrypted? What about USB (thumb) drives that contain company files… are those encrypted? What would happen if that laptop or USB drive were to go missing, or even stolen? All those files could easily be read, copied, sold etc. Consider using encryption on sensitive files wherever they may be located. It becomes very difficult for attackers to read them if they are encrypted.

Sensitive information is the holy grail of an organization. If it were to be stolen or lost, the company is at risk of losing value, may suffer fines, and even public embarrassment. Treat your company’s data like you would your own social security number, credit card information, or healthcare information: with great care.

Let’s stay safe out there! Stop, Look, and Think.


Recently, the Centers of Medicare and Medicaid Services (CMS) has alerted carriers and the public of a scam designed to generate Medicare member referrals to genetic testing companies.

Cornerstone Senior Marketing cares about you and your client’s bet interest. This includes making sure you know what is and is not compliant. Read what some carriers have to say about this fraudulent scam:

If you have any questions please reach out to your CSM representative! We are here to help.

TECH TIP: “Safe” Email Attachments

You may already be aware that you should not open email attachments with an extension such as “.exe”, but did you know that even PDFs or Word Documents can be rendered unsafe to open? Opening these attachments from senders with malicious intent can cause your computer (and any networks to which you are connected) to be compromised, hacked or even riddled with ransomware.

What are the unsafe file types to look out for?  This question is better answered by listing file types that are generally considered to be safe to open. The truth is that most file types are at risk of being “booby-trapped” to attack your computer or device. The general rule is to NEVER open any email attachment if you do not know who it came from or why you received it

You should always be on guard with any email attachments that are not .TXT files. 

How can I tell if an attachment is safe to open?

  • Ask yourself: Was I expecting to receive this attachment, and did it come from who I would expect it to come from? Check email addresses for any “red flags” that may indicate the email address has been spoofed or faked.
  • Never open an email attachment if you don’t recognize the sender that it came from.
  • If you recognize the person or email address sending you the file, but it was still unexpected, contact them first through a different form of communication (such as by phone) to ask them if they intended to send you the file.

Let’s stay safe out there!

Stop, Look, and Think.


Reporting Fraud, Waste, and Abuse

Cornerstone employees and broker partners are required to report suspected Fraud, Waste and Abuse. You can report Fraud, Waste and Abuse to Cornerstone’s Tim Shook at 513-629-9505 or email Additionally, you can report suspected Fraud, Waste or Abuse anonymously via the following Plan Sponsor hotlines:

Aetna: 1-860-273-3586

MMO: 1-800-762-8130

UnitedHealthcare: 1-877-401-9430

Humana: 1-800-614-4126

Paramount: 1-800-462-3589

Premier: 1-888-271-2688

Anthem: 1-800-203-3738