Cheetah Company Cyber Security Posture

cheetahinc.com

Cheetah, a business unit of Accutech Systems Corp., provides solutions for trust accounting, investment management, trading, reporting, and advanced portfolio management, enabling wealth managers to grow their business.

Cheetah Company Details

Linkedin ID:

accutech-systems-corporation

Employees number:

187 employees

Number of followers:

2150.0

NAICS:

511

Industry Type:

Software Development

Homepage:

cheetahinc.com

IP Addresses:

Scan still pending

Company ID:

CHE_1417564

Scan Status:

In-progress

AI scoreCheetah Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreCheetah Global Score
blurone
Ailogo

Cheetah Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Cheetah Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Accutech Systems CorporationBreach85408/2021ACC13337522Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Accutech Systems Corp., a financial services company experienced a data security incident in August 2021. An unauthorized party gained access to the names and financial account information of more than 39,500 individuals nationwide. The company on finding unusual activities on its systems immediately launched the investigation and upon determination of breach notified the affected individuals.

Cheetah Company Subsidiaries

SubsidiaryImage

Cheetah, a business unit of Accutech Systems Corp., provides solutions for trust accounting, investment management, trading, reporting, and advanced portfolio management, enabling wealth managers to grow their business.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=accutech-systems-corporation' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Cheetah Cyber Security News

2025-07-09T20:51:08.000Z
Cohesity makes bold moves in cybersecurity market

Cohesity was quick to infuse AI into its Data Cloud offering, which uses a clean room design environment to overcome cyberattacks.

2025-04-16T07:00:00.000Z
A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm

The study aims to address critical challenges in network security, particularly the limitations of traditional intrusion detection systemsย ...

2025-05-13T07:00:00.000Z
Go phish: Jill Knesek, CISO at BlackLine

We Go Phishing with former FBI Agent Jill Knesek, now CISO at BlackLine, to discuss what makes her tick.

2024-09-30T07:00:00.000Z
Sea Cheetah partners with H3 Dynamics on new vessel

Serge Markoff, founder and CEO of Sea Cheetah explained how the lighter aircraft powertrain would allow the vessel to better complete its coreย ...

2024-09-05T07:00:00.000Z
X beefs up safety staff, a few dozen people at a time

X (formerly Twitter) is re-investing in its trust, safety and security teams pre-election, after CEO Elon Musk controversially dissolved theย ...

2018-09-16T07:00:00.000Z
What Is the Most Important Skill Cyber Security Professionals Can Possess? The Experts Weigh In

The cyber security field is booming, with demand for cyber security professionals far outpacing supply. This talent shortage has created anย ...

2024-07-26T07:00:00.000Z
Saudi Arabia Celebrates Birth Of First Cheetah Cubs In 40 Years

The National Center for Wildlife (NCW) has welcomed the birth of four cheetah cubs, marking a major stride in the Kingdom's wildlifeย ...

2024-10-14T07:00:00.000Z
Robot vacuums spew racial slurs at owners in wake of hack

An ABC Australia investigation confirmed multiple hacked Ecovacs abusing homeowners, months after a massive report showed vulnerabilities inย ...

2018-11-27T08:00:00.000Z
8 Popular Android Apps Caught Up In Million-Dollar Ad Fraud Scheme

Cheetah Android Apps With More Than 2 Billion Downloads Accused of Running Massive Ad Fraud Scheme.

similarCompanies

Cheetah Similar Companies

Cisco

Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

Thomson Reuters

Thomson Reuters is the worldโ€™s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat

Alibaba.com

The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t

Intuit

Intuit is a global technology platform that helps our customers and communities overcome their most important financial challenges. Serving millions of customers worldwide with TurboTax, QuickBooks, Credit Karma and Mailchimp, we believe that everyone should have the opportunity to prosper and we wo

At Agoda, we bridge the world through travel. We aim to make it easy and rewarding for more travelers to explore and experience the amazing world we live in. We do so by enabling more people to see the world for less โ€“ with our best-value deals across our 4,700,000+ hotels and holiday properties, 13

[24]7.ai

[24]7.aiโ„ข customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Cheetah CyberSecurity History Information

How many cyber incidents has Cheetah faced?

Total Incidents: According to Rankiteo, Cheetah has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Cheetah?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does Cheetah detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Notified affected individuals.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Security Incident at Accutech Systems Corp.

Description: An unauthorized party gained access to the names and financial account information of more than 39,500 individuals nationwide.

Date Detected: August 2021

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach ACC13337522

Data Compromised: names, financial account information

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names and financial account information.

Which entities were affected by each incident?

Incident : Data Breach ACC13337522

Entity Type: Company

Industry: Financial Services

Customers Affected: 39,500

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach ACC13337522

Communication Strategy: Notified affected individuals

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach ACC13337522

Type of Data Compromised: names, financial account information

Number of Records Exposed: 39,500

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Notified affected individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach ACC13337522

Customer Advisories: Notified affected individuals

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notified affected individuals.

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on August 2021.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were names and financial account information.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names and financial account information.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 39.5K.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an Notified affected individuals.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge