This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet articles
Latest comment: 1 year ago1 comment1 person in discussion
Received yesterday, sent Aug. 9th, 2023:
The Missouri Department of Social Services sent a letter to Medicaid holders. DSS uses IBM as a contractor, and because of the "critical vulnerability" in MOVEit Transfer, anyone who has Medicaid has possibly had their information stolen. DSS is investigating and has already determined the information taken was Medicaid participant health information. They are still analyzing the files, as they recieved a copy and due to the size and formatting it will "take time to complete this analysis."
They've stated the information involved may include participants "name, department client number (DCN), date of birth, possible benefit eligibility status or coverage, and medical claims information." They have said they will "contact additional people individually if needed."
They have recommended for people recieving this letter to monitor/review their credit reports during this time. They further suggest they can receive a credit freeze, or request a free credit report from the "three major reporting services," and then proceeds to list contact information for Experian, Equifax, and TransUnion.
They have also partnered with IDX, a ZeroFox Company, to have a dedicated call center for any Medicaid participants with questions or concerns relating to the breach. They also created a website to answer many questions people may commonly have, as well as to place updates regarding the status of the investigation. 71.36.203.90 (talk) 17:43, 16 August 2023 (UTC)Reply