Company Details
wps-health-insurance
1,215
8,437
524
wpshealth.com
4
WPS_1185165
Completed

WPS Health Insurance Company CyberSecurity Posture
wpshealth.comWPS Health Insurance is based in Madison, Wis., and is deeply committed to Wisconsin and its citizens. One of the largest health benefits providers in the state, WPS remains not-for-profit and offers health plans to the public and private sectors. WPS offers Preferred Provider Organization (PPO) health plans for individuals and groups, including high-deductible health plan (HDHP) options that allow the use of Health Savings Accounts (HSAs). WPS also has Medicare supplement plans available for individuals who are eligible for Medicare. WPS contracts with health care providers across the state to provide comprehensive provider networks that include the physicians, specialists, clinics, and hospitals that our customers know and trust. We also offer national networks to cover out-of-state health care needs.
Company Details
wps-health-insurance
1,215
8,437
524
wpshealth.com
4
WPS_1185165
Completed
Between 700 and 749

WHI Global Score (TPRM)XXXX

Description: The notification from CMS revealed that due to a security vulnerability in the MOVEit software, unauthorized third parties gained access to the personal information (PII) of 946,801 Medicare beneficiaries. The breach occurred between May 27 and May 31, 2023, and impacted data related to Medicare claims management and CMS audits. The breach was reported to CMS on July 8, and affected individuals are being notified of the potential compromise of their PII.
Description: The Centers for Medicare & Medicaid Services (CMS) and WPS announced a security breach stemming from a vulnerability in the MOVEit software by Progress Software. Unauthorized access was gained to PII of Medicare beneficiaries, affecting Medicare claim management and CMS audits of healthcare providers. This incident, which took place between May 27 and May 31, 2023, compromised personal data for 946,801 individuals.
Description: WPS, in conjunction with the CMS, is notifying individuals of a data breach due to a vulnerability in the MOVEit software developed by Progress Software. This breach occurred between May 27 and May 31, 2023, and compromised the PII of Medicare beneficiaries. The exposed data was collected for managing Medicare claims and supporting CMS audits of healthcare providers. This affected PII includes individuals who are not Medicare beneficiaries but have received healthcare services. A total of 946,801 people were notified of the potential leak of their personal information.
Description: A security breach occurred involving the MOVEit software used by WPS for handling Medicare administrative services, resulting in unauthorized access to personal information. The breach, dating from May 27 to May 31, 2023, compromised the protected health information (PHI) of Medicare beneficiaries managed for claim purposes and personal identifiable information (PII) supporting CMS audits. Notifications were issued to the affected 946,801 individuals after WPS informed CMS of the breach on July 8.
Description: WPS, a contractor for the Centers for Medicare & Medicaid Services (CMS), experienced a data breach due to a vulnerability in the MOVEit software used for transferring files. This incident, occurring between May 27 and May 31, 2023, potentially compromised the personally identifiable information (PII) of Medicare beneficiaries, related to Medicare claims management, and PII supporting CMS audits of healthcare providers. Approximately 946,801 individuals are affected and notifications are being sent to those whose information was at risk. The breach was disclosed to CMS on July 8, following the discovery of the unauthorized access to personal data.
Description: WPS, in connection with its Medicare administrative services, reported a security breach due to a vulnerability in the MOVEit software provided by Progress Software. This incident potentially compromised the protected health information (PHI) of 946,801 Medicare beneficiaries, including data essential for managing Medicare claims and supporting CMS audits. Unauthorized access occurred between May 27 and May 31, 2023, was discovered later, and notifications to affected individuals commenced following the breach acknowledgment.
Description: A security vulnerability in the MOVEit software, developed by Progress Software and used by WPS to transfer files in the provision of services to CMS, led to unauthorized access of personal information. Between May 27 and May 31, 2023, personally identifiable information (PII) of Medicare beneficiaries—collected for managing Medicare claims and CMS audits of healthcare providers—was compromised, affecting up to 946,801 individuals. WPS discovered and reported the breach to CMS, initiating notifications to the impacted parties.
Description: WPS, working with CMS, has begun notifying nearly a million individuals affected by a breach concerning their protected health information. This was due to a security flaw in MOVEit software developed by Progress Software, leading to unauthorized access of Medicare beneficiary PII during file transfers for Medicare claim management and CMS healthcare provider audits. The breach occurred from May 27 to 31, 2023, with WPS informing CMS on July 8. 946,801 Medicare recipients are receiving notifications of this compromise of their personal data.


No incidents recorded for WPS Health Insurance in 2025.
No incidents recorded for WPS Health Insurance in 2025.
No incidents recorded for WPS Health Insurance in 2025.
WHI cyber incidents detection timeline including parent company and subsidiaries

WPS Health Insurance is based in Madison, Wis., and is deeply committed to Wisconsin and its citizens. One of the largest health benefits providers in the state, WPS remains not-for-profit and offers health plans to the public and private sectors. WPS offers Preferred Provider Organization (PPO) health plans for individuals and groups, including high-deductible health plan (HDHP) options that allow the use of Health Savings Accounts (HSAs). WPS also has Medicare supplement plans available for individuals who are eligible for Medicare. WPS contracts with health care providers across the state to provide comprehensive provider networks that include the physicians, specialists, clinics, and hospitals that our customers know and trust. We also offer national networks to cover out-of-state health care needs.

Humana will never ask, nor require a candidate to provide money for work equipment and network access during the application process. If you become aware of any instances where you as a candidate are asked to provide information and do not believe it is a legitimate request from Humana or affiliate,
At Allstate, we're advocates for peace of mind and a good life. And that comes through in everything we do. From building innovative teams that truly understand our customers' needs, to challenging each other to develop our careers in a meaningful way, and finally to the incredible results we're a

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Pr

At State Farm®, our mission is to help people manage the risks of everyday life, recover from the unexpected, and realize their dreams. We are passionate and driven to create possibilities, and we’re serious about helping customers by providing solutions for all of life’s moments. Like a good neighb
China Pacific Life Insurance Co., Ltd (CPIC Life in short) was formed on the basis of life insurance business of China Pacific Insurance Co., Ltd., which was founded on May 13th 1991, and is held by CPIC Group. The company was incorporated in November 11, 2001, headquartered in Shanghai and register

Hi, we’re HUB. We advise businesses and individuals on how to reach their goals. When you partner with us, you’re at the center of a vast network of risk, insurance, employee benefits, retirement and wealth management specialists that bring clarity to a changing world with tailored solutions and un
American International Group, Inc. (NYSE: AIG) is a leading global insurance organization. AIG provides insurance solutions that help businesses and individuals in approximately 190 countries and jurisdictions protect their assets and manage risks through AIG operations and network partners. Additi

FWD Group (1828.HK) is a pan-Asian life and health insurance business that serves approximately 34 million customers across 10 markets, including BRI Life in Indonesia. FWD’s customer-led and tech-enabled approach aims to deliver innovative propositions, easy-to-understand products and a simpler ins

China Life Insurance (Group) Company, headquartered in Beijing, is a large state-owned financial and insurance company. Its predecessor,PICC was founded in 1949 and the PICC (Life) Co.,Ltd was set up in 1996 after its separation from the former PICC. In 1999, it was renamed China Life Insurance Comp
.png)
MADISON, Wis.--(BUSINESS WIRE)--#DigitalHealth--WPS, a long-standing provider of health insurance and government services, is excited to announce a...
Cyber threats against hospitals are surging. What steps are being taken by the health-care sector to address the increasing impacts of cyber attacks?
In 2024, there were 14 data breaches involving more than 1 million healthcare records, including the biggest healthcare data breach of all time.
The Centers for Medicare & Medicaid Services (“CMS”) and its contractor, Wisconsin Physicians Service Insurance Corporation (“WPS”),...
The Department of Health and Human Services (HHS) Centers for Medicare and Medicaid Services (CMS) has reported a data breach to the HHS...
Our devices offer so many benefits and have become such an integral part of our lives that we often forget how much easier they make it for...
After the Medicare data breach, you can continue to use your existing Medicare card; beneficiaries with compromised Medicare Beneficiary...
Nearly 1 million Medicare beneficiaries might have had their sensitive information compromised last year.
Updated Sept. 10 to reflect new information from CMS and WPS reflecting increases in the number of people affected and the number of states...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of WPS Health Insurance is https://www.wpshealth.com.
According to Rankiteo, WPS Health Insurance’s AI-generated cybersecurity score is 742, reflecting their Moderate security posture.
According to Rankiteo, WPS Health Insurance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, WPS Health Insurance is not certified under SOC 2 Type 1.
According to Rankiteo, WPS Health Insurance does not hold a SOC 2 Type 2 certification.
According to Rankiteo, WPS Health Insurance is not listed as GDPR compliant.
According to Rankiteo, WPS Health Insurance does not currently maintain PCI DSS compliance.
According to Rankiteo, WPS Health Insurance is not compliant with HIPAA regulations.
According to Rankiteo,WPS Health Insurance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
WPS Health Insurance operates primarily in the Insurance industry.
WPS Health Insurance employs approximately 1,215 people worldwide.
WPS Health Insurance presently has no subsidiaries across any sectors.
WPS Health Insurance’s official LinkedIn profile has approximately 8,437 followers.
WPS Health Insurance is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.
No, WPS Health Insurance does not have a profile on Crunchbase.
Yes, WPS Health Insurance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wps-health-insurance.
As of November 28, 2025, Rankiteo reports that WPS Health Insurance has experienced 8 cybersecurity incidents.
WPS Health Insurance has an estimated 14,860 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notifications sent to affected individuals, and communication strategy with notifying affected individuals, and communication strategy with notifications to affected individuals, and communication strategy with notifying affected individuals, and communication strategy with notifications to impacted parties..
Title: CMS and WPS Security Breach
Description: A security breach affecting the personal information of Medicare beneficiaries due to a vulnerability in the MOVEit software by Progress Software.
Date Detected: 2023-05-27
Type: Data Breach
Attack Vector: Software Vulnerability
Vulnerability Exploited: MOVEit Software Vulnerability
Title: WPS Data Breach
Description: WPS, a contractor for the Centers for Medicare & Medicaid Services (CMS), experienced a data breach due to a vulnerability in the MOVEit software used for transferring files. This incident, occurring between May 27 and May 31, 2023, potentially compromised the personally identifiable information (PII) of Medicare beneficiaries, related to Medicare claims management, and PII supporting CMS audits of healthcare providers. Approximately 946,801 individuals are affected and notifications are being sent to those whose information was at risk. The breach was disclosed to CMS on July 8, following the discovery of the unauthorized access to personal data.
Date Detected: 2023-07-08
Date Publicly Disclosed: 2023-07-08
Type: Data Breach
Attack Vector: Vulnerability Exploitation
Vulnerability Exploited: MOVEit software vulnerability
Title: Data Breach at WPS Affecting Medicare Beneficiaries
Description: WPS, in conjunction with the CMS, is notifying individuals of a data breach due to a vulnerability in the MOVEit software developed by Progress Software. This breach occurred between May 27 and May 31, 2023, and compromised the PII of Medicare beneficiaries. The exposed data was collected for managing Medicare claims and supporting CMS audits of healthcare providers. This affected PII includes individuals who are not Medicare beneficiaries but have received healthcare services. A total of 946,801 people were notified of the potential leak of their personal information.
Date Detected: 2023-05-27
Type: Data Breach
Attack Vector: Software Vulnerability
Vulnerability Exploited: MOVEit software vulnerability
Title: CMS Medicare Beneficiaries Data Breach
Description: Unauthorized third parties gained access to the personal information (PII) of 946,801 Medicare beneficiaries due to a security vulnerability in the MOVEit software.
Date Detected: 2023-07-08
Type: Data Breach
Attack Vector: Software Vulnerability
Vulnerability Exploited: MOVEit software vulnerability
Threat Actor: Unauthorized third parties
Title: MOVEit Software Breach
Description: A security breach occurred involving the MOVEit software used by WPS for handling Medicare administrative services, resulting in unauthorized access to personal information.
Date Detected: 2023-05-27
Date Publicly Disclosed: 2023-07-08
Type: Security Breach
Title: WPS Medicare Administrative Services Security Breach
Description: WPS, in connection with its Medicare administrative services, reported a security breach due to a vulnerability in the MOVEit software provided by Progress Software. This incident potentially compromised the protected health information (PHI) of 946,801 Medicare beneficiaries, including data essential for managing Medicare claims and supporting CMS audits. Unauthorized access occurred between May 27 and May 31, 2023, was discovered later, and notifications to affected individuals commenced following the breach acknowledgment.
Type: Data Breach
Attack Vector: Software Vulnerability
Vulnerability Exploited: MOVEit software vulnerability
Title: Medicare Beneficiary PII Breach via MOVEit Software
Description: WPS, working with CMS, has begun notifying nearly a million individuals affected by a breach concerning their protected health information. This was due to a security flaw in MOVEit software developed by Progress Software, leading to unauthorized access of Medicare beneficiary PII during file transfers for Medicare claim management and CMS healthcare provider audits. The breach occurred from May 27 to 31, 2023, with WPS informing CMS on July 8. 946,801 Medicare recipients are receiving notifications of this compromise of their personal data.
Date Detected: 2023-07-08
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Security flaw in MOVEit software
Title: MOVEit Software Vulnerability Leads to Unauthorized Access of Medicare Beneficiaries' PII
Description: A security vulnerability in the MOVEit software, developed by Progress Software and used by WPS to transfer files in the provision of services to CMS, led to unauthorized access of personal information. Between May 27 and May 31, 2023, personally identifiable information (PII) of Medicare beneficiaries—collected for managing Medicare claims and CMS audits of healthcare providers—was compromised, affecting up to 946,801 individuals. WPS discovered and reported the breach to CMS, initiating notifications to the impacted parties.
Type: Data Breach
Attack Vector: Software Vulnerability
Vulnerability Exploited: MOVEit software vulnerability
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Security flaw in MOVEit software.

Data Compromised: Personal Information of Medicare Beneficiaries
Systems Affected: Medicare Claim Management and CMS Audits

Data Compromised: PII of Medicare beneficiaries

Data Compromised: Pii

Data Compromised: PII of Medicare beneficiaries

Data Compromised: Phi, Pii

Data Compromised: Protected health information (phi), Medicare claims data, Cms audit data
Systems Affected: MOVEit software

Data Compromised: Personally Identifiable Information (PII)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, PII, PII, PII, Phi, Pii, , Protected Health Information (Phi), Medicare Claims Data, Cms Audit Data, , PII and PII.

Entity Name: Centers for Medicare & Medicaid Services (CMS)
Entity Type: Government Agency
Industry: Healthcare
Customers Affected: 946801

Entity Name: WPS
Entity Type: Contractor
Industry: Healthcare
Customers Affected: 946,801

Entity Name: WPS
Entity Type: Company
Industry: Healthcare
Customers Affected: 946,801

Entity Name: Centers for Medicare & Medicaid Services (CMS)
Entity Type: Government Agency
Industry: Healthcare
Location: United States
Customers Affected: 946,801 Medicare beneficiaries

Entity Name: WPS
Entity Type: Organization
Industry: Healthcare
Customers Affected: 946801

Entity Name: WPS
Entity Type: Organization
Industry: Healthcare
Customers Affected: 946801

Entity Name: WPS
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 946801

Entity Name: WPS
Entity Type: Company
Industry: Healthcare
Customers Affected: 946,801

Communication Strategy: Notifications sent to affected individuals

Communication Strategy: Notifying affected individuals

Communication Strategy: Notifications to affected individuals

Communication Strategy: Notifying affected individuals

Communication Strategy: Notifications to impacted parties

Type of Data Compromised: Personal Information
Number of Records Exposed: 946801
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: PII
Number of Records Exposed: 946,801
Sensitivity of Data: High
Personally Identifiable Information: Medicare claims management, PII supporting CMS audits of healthcare providers

Type of Data Compromised: PII
Number of Records Exposed: 946,801
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Phi, Pii
Number of Records Exposed: 946801
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Protected health information (phi), Medicare claims data, Cms audit data
Number of Records Exposed: 946801
Sensitivity of Data: High

Type of Data Compromised: PII
Number of Records Exposed: 946801
Sensitivity of Data: High
Personally Identifiable Information: Yes

Regulatory Notifications: Reported to CMS

Source: CMS Notification
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CMS Notification.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications sent to affected individuals, Notifying affected individuals, Notifications To Affected Individuals, Notifying affected individuals and Notifications to impacted parties.

Customer Advisories: Notifications sent to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notifications sent to affected individuals.

Entry Point: Security flaw in MOVEit software

Root Causes: Security flaw in MOVEit software
Last Attacking Group: The attacking group in the last incident was an Unauthorized third parties.
Most Recent Incident Detected: The most recent incident detected was on 2023-05-27.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-07-08.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information of Medicare Beneficiaries, PII of Medicare beneficiaries, PII, , PII of Medicare beneficiaries, PHI, PII, , Protected Health Information (PHI), Medicare claims data, CMS audit data, , PII and Personally Identifiable Information (PII).
Most Significant System Affected: The most significant system affected in an incident was MOVEit software and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were PHI, Personally Identifiable Information (PII), Protected Health Information (PHI), CMS audit data, Medicare claims data, PII of Medicare beneficiaries, Personal Information of Medicare Beneficiaries and PII.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.8M.
Most Recent Source: The most recent source of information about an incident is CMS Notification.
Most Recent Customer Advisory: The most recent customer advisory issued was an Notifications sent to affected individuals.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Security flaw in MOVEit software.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.