- Reaction score
- 27,846
- Points
- 1,090
Great. That is, basically, everyone.
See, if you'd taken FRP in '96, this wouldn't be your problem. So really, it's your fault.
(Do I need to add the /s ?)
Great. That is, basically, everyone.
The hack took place on 19 Oct and this message was released on 17 Nov. I think I have a different definition of proactive than the government.The Government of Canada is not waiting for the outcomes of this analysis and is taking a proactive, precautionary approach to support those potentially affected.
Is the email still there? I saw it in my inbox this morning, but don’t now.Got an email telling me about the breach and a link to 12 months of credit monitoring by Equifax. Was watching credit report anyway through bank as I recently used BGRS for a move. Only took 2+ months for an official comms to individuals
Same, just got it a week ago.Got an email telling me about the breach and a link to 12 months of credit monitoring by Equifax. Was watching credit report anyway through bank as I recently used BGRS for a move. Only took 2+ months for an official comms to individuals
Still there.Is the email still there? I saw it in my inbox this morning, but don’t now.
According to a statement, MSH International, the sub-contractor to Canada Life that provides emergency travel and comprehensive coverage services to members of the Public Service Health Care Plan (PSHCP), was affected. The TBS was made aware of the incident.
Now that makes sense why you couldn’t get on the MSH portal.Not only are members / veterans concerned about BGRS being hacked, we can now add the hack to a portion of our PSHCP information.
Reference:
Crowther, H. (2024, February 12). 'Cyber incident' affects health insurance provider for public servants: federal government. CTV News.
Official notification coming in 3-4 months.Not only are members / veterans concerned about BGRS being hacked, we can now add the hack to a portion of our PSHCP information.
Reference:
Crowther, H. (2024, February 12). 'Cyber incident' affects health insurance provider for public servants: federal government. CTV News.
Oh you optimist.....Official notification coming in 3-4 months.
So, if a CAF member ends up going into financial distress or bankruptcy bc their dependent gets sick and MSH isn’t processing claims, how hooped are they?From what I understand, MSH hasn't been processing claims for months anyway, so not having portal access just means that they only have to ignore phone calls and emails.
There are at least a few public servants (article in French below), but sure there are more CAF members as well. Sure, you can get distress loans, but people working OUTCAN shouldn't be messing around with insurance claims for six months plus when they are talking $10-20k+.So, if a CAF member ends up going into financial distress or bankruptcy bc their dependent gets sick and MSH isn’t processing claims, how hooped are they?
Because I’m sure there are some cases out there.
Isn’t that like saying Power Corp. is the problem, not Great Western Life or Canada Life?Strictly speaking, it's SIRVA, parent company of BGRS, that was hacked, not BGRS. The BGRS data was not breached, but data held by other companies under SIRVA who BGRS contracted with.
You're right. Fail points in cyber breaches are quite precise. Where and how it happened and who was responsible matters.There is value in identifying where the failure occurred. BGRS has plenty of problems (a non-zero number of which are actually CAF requirements failures) but its system wasn't breached.
Oh you optimist.....Official notification coming in 3-4 months.
I know virtually SFA about cyber and its intricacies. But I do know its worth protecting and finding out who is responsible.You're right. Fail points in cyber breaches are quite precise. Where and how it happened and who was responsible matters.