IAMS Data Breach Leaks Sensitive Personal Info, Including Social Security Numbers

Will Gendron
Editor in Chief
Published
September 19, 2024
Updated
December 6, 2024
IAMS Data Breach Leaks Sensitive Personal Info, Including Social Security Numbers
Insurance Agency Marketing Services, Inc.
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

On September 19, 2024, Insurance Agency Marketing Services, Inc. (IAMS) disclosed a significant data breach that occurred between March 1 and May 3, 2024. During this period, an unauthorized third party remotely accessed certain IAMS computer systems. As a result, sensitive personal information may have been accessed or acquired. The breach affected approximately 5,788 individuals in Texas alone, with additional impacts in other states.

The exposed information includes a wide range of personal data, which is particularly concerning given the nature of the information:

  • Name of individual
  • Address
  • Social Security Number
  • Driver’s License number
  • Government-issued ID number (e.g., passport, state ID card)
  • Financial Information (e.g., account number, credit or debit card number)
  • Medical Information
  • Health Insurance Information
  • Date of Birth

The breach was reported to the Attorney General's offices in several states, including California, Texas, and Massachusetts.

IAMS's Response

Upon discovering the breach, IAMS took immediate action to address the situation. The company engaged third-party cybersecurity experts to investigate and remediate the incident, ensuring that the security of their systems was thoroughly assessed and enhanced.
IAMS also reported the breach to the Federal Bureau of Investigation to assist in the investigation. To support those affected, IAMS is offering identity theft protection services through CyEx, including at least 12 months of single bureau credit monitoring and identity theft recovery services. Affected individuals can enroll in these services by visiting app.identitydefense.com or by calling CyEx at 1-866-622-9303.

Protecting Yourself After the Data Breach

If you have been affected by this data breach, it is crucial to take proactive steps to protect your personal information. Here are some recommended actions:

  1. Enroll in Credit Monitoring: Take advantage of the credit monitoring services offered by IAMS through CyEx. This will help you detect any suspicious activity on your credit report.
  2. Review Your Credit Reports: Regularly check your credit reports for any unauthorized transactions or accounts. You are entitled to one free copy of your credit report every 12 months from each of the three major consumer reporting agencies.
  3. Place Fraud Alerts: Consider placing a fraud alert on your credit file. This will notify creditors to take extra steps to verify your identity before opening new accounts in your name.
  4. Consider a Security Freeze: A security freeze can prevent new creditors from accessing your credit report, making it harder for identity thieves to open accounts in your name.
  5. Stay Vigilant: Monitor your financial accounts and report any suspicious activity immediately. You can also contact the Federal Trade Commission for additional guidance on preventing identity theft.
6.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Consumers Notification date
Date of Breach
May 3, 2024
Breach Discovered Date
Total People Affected
Information Types Exposed
  • Social Security Numbers
  • Medical Records
  • Financial Account
  • Drivers Licenses
  • Credit/Debit Numbers
  • Name of individual
  • Address
  • Driver’s License number
  • Government-issued ID number (e.g. passport,

Join the

Insurance Agency Marketing Services, Inc.

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image