
Cheetah Company Cyber Security Posture
cheetahinc.comCheetah, a business unit of Accutech Systems Corp., provides solutions for trust accounting, investment management, trading, reporting, and advanced portfolio management, enabling wealth managers to grow their business.
Cheetah Company Details
accutech-systems-corporation
187 employees
2150.0
511
Software Development
cheetahinc.com
Scan still pending
CHE_1417564
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Cheetah Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Cheetah Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Accutech Systems Corporation | Breach | 85 | 4 | 08/2021 | ACC13337522 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Accutech Systems Corp., a financial services company experienced a data security incident in August 2021. An unauthorized party gained access to the names and financial account information of more than 39,500 individuals nationwide. The company on finding unusual activities on its systems immediately launched the investigation and upon determination of breach notified the affected individuals. |
Cheetah Company Subsidiaries

Cheetah, a business unit of Accutech Systems Corp., provides solutions for trust accounting, investment management, trading, reporting, and advanced portfolio management, enabling wealth managers to grow their business.
Access Data Using Our API

Get company history
.png)
Cheetah Cyber Security News
Cohesity makes bold moves in cybersecurity market
Cohesity was quick to infuse AI into its Data Cloud offering, which uses a clean room design environment to overcome cyberattacks.
A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm
The study aims to address critical challenges in network security, particularly the limitations of traditional intrusion detection systemsย ...
Go phish: Jill Knesek, CISO at BlackLine
We Go Phishing with former FBI Agent Jill Knesek, now CISO at BlackLine, to discuss what makes her tick.
Sea Cheetah partners with H3 Dynamics on new vessel
Serge Markoff, founder and CEO of Sea Cheetah explained how the lighter aircraft powertrain would allow the vessel to better complete its coreย ...
X beefs up safety staff, a few dozen people at a time
X (formerly Twitter) is re-investing in its trust, safety and security teams pre-election, after CEO Elon Musk controversially dissolved theย ...
What Is the Most Important Skill Cyber Security Professionals Can Possess? The Experts Weigh In
The cyber security field is booming, with demand for cyber security professionals far outpacing supply. This talent shortage has created anย ...
Saudi Arabia Celebrates Birth Of First Cheetah Cubs In 40 Years
The National Center for Wildlife (NCW) has welcomed the birth of four cheetah cubs, marking a major stride in the Kingdom's wildlifeย ...
Robot vacuums spew racial slurs at owners in wake of hack
An ABC Australia investigation confirmed multiple hacked Ecovacs abusing homeowners, months after a massive report showed vulnerabilities inย ...
8 Popular Android Apps Caught Up In Million-Dollar Ad Fraud Scheme
Cheetah Android Apps With More Than 2 Billion Downloads Accused of Running Massive Ad Fraud Scheme.

Cheetah Similar Companies

Cisco
Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

Thomson Reuters
Thomson Reuters is the worldโs leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat

Alibaba.com
The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t

Intuit
Intuit is a global technology platform that helps our customers and communities overcome their most important financial challenges. Serving millions of customers worldwide with TurboTax, QuickBooks, Credit Karma and Mailchimp, we believe that everyone should have the opportunity to prosper and we wo

Agoda
At Agoda, we bridge the world through travel. We aim to make it easy and rewarding for more travelers to explore and experience the amazing world we live in. We do so by enabling more people to see the world for less โ with our best-value deals across our 4,700,000+ hotels and holiday properties, 13

[24]7.ai
[24]7.aiโข customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Cheetah CyberSecurity History Information
How many cyber incidents has Cheetah faced?
Total Incidents: According to Rankiteo, Cheetah has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Cheetah?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does Cheetah detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Notified affected individuals.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Security Incident at Accutech Systems Corp.
Description: An unauthorized party gained access to the names and financial account information of more than 39,500 individuals nationwide.
Date Detected: August 2021
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach ACC13337522
Data Compromised: names, financial account information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names and financial account information.
Which entities were affected by each incident?

Incident : Data Breach ACC13337522
Entity Type: Company
Industry: Financial Services
Customers Affected: 39,500
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach ACC13337522
Communication Strategy: Notified affected individuals
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach ACC13337522
Type of Data Compromised: names, financial account information
Number of Records Exposed: 39,500
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Notified affected individuals.
Stakeholder and Customer Advisories
Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach ACC13337522
Customer Advisories: Notified affected individuals
What advisories does the company provide to stakeholders and customers following an incident?
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notified affected individuals.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on August 2021.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were names and financial account information.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names and financial account information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 39.5K.
Stakeholder and Customer Advisories
What was the most recent customer advisory issued?
Most Recent Customer Advisory: The most recent customer advisory issued was was an Notified affected individuals.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
