Alaska Regional Hospital Company Cyber Security Posture

alaskaregional.com

For years Alaska Regional has been continually improving the scope of services and skills available within the state so Alaskans can access high quality care right here at home. With more than 1,000 employees and a medical staff of over 700 independent practitioners, Alaska Regional offers a broad spectrum of health services to the community. The hospital is the designated Shriners clinic facility in Alaska, and free immunization clinics are held monthly for area schoolchildren. Alaska Regional Hospital is part of HCA Healthcare. HCA Healthcare has been continually named a World's Most Ethical Company by Ethisphere since 2010. In 2019, HCA Healthcare spent an estimated $3.7 billion in cost for the delivery of charitable care, uninsured discounts, and other uncompensated expenses.

ARH Company Details

Linkedin ID:

alaska-regional-hospital

Employees number:

458 employees

Number of followers:

3340

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

alaskaregional.com

IP Addresses:

Scan still pending

Company ID:

ALA_1928919

Scan Status:

In-progress

AI scoreARH Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Alaska Regional Hospital Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

Alaska Regional Hospital Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
HCA HealthcareBreach100407/2023HCA25118923Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: HCA Healthcare reported a data breach that resulted in the exposure of about 11 million patients' personal data. When a threat actor reported the intrusion on a dark web forum on July 5, the company learned of the security lapse. Threat actors published stolen data for a few of the patients as evidence of the hack, including the patient's name, city, state, and zip code, as well as their email address, phone number, date of birth, gender, and the date and place of their most recent service. With the assistance of outside forensic and threat intelligence advisers, HCA Healthcare opened an investigation into the security incident. The investigation is still ongoing despite the company's notification to law police.

Alaska Regional HospitalRansomware100510/2023ALA6595124Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: ESO Solutions, a key software provider for healthcare and emergency services, was the victim of a ransomware attack. This cyberattack led to unauthorized data access and encryption of various company systems. The breach exposed a variety of personal information, depending on what patients had shared with their healthcare providers using ESOโ€™s software. Compromised data includes: Full names Birth dates Phone numbers Patient account and medical record numbers Injury, diagnosis, treatment, and procedure details Social Security Numbers. It was confirmed that this breach affected data belonging to patients associated with ESOโ€™s client hospitals and clinics in the U.S. To help mitigate risks, ESO is offering a year of identity monitoring services through Kroll to all notified individuals.

Alaska Regional Hospital Company Subsidiaries

SubsidiaryImage

For years Alaska Regional has been continually improving the scope of services and skills available within the state so Alaskans can access high quality care right here at home. With more than 1,000 employees and a medical staff of over 700 independent practitioners, Alaska Regional offers a broad spectrum of health services to the community. The hospital is the designated Shriners clinic facility in Alaska, and free immunization clinics are held monthly for area schoolchildren. Alaska Regional Hospital is part of HCA Healthcare. HCA Healthcare has been continually named a World's Most Ethical Company by Ethisphere since 2010. In 2019, HCA Healthcare spent an estimated $3.7 billion in cost for the delivery of charitable care, uninsured discounts, and other uncompensated expenses.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=alaska-regional-hospital' -H 'apikey: YOUR_API_KEY_HERE'
newsone

ARH Cyber Security News

2025-07-03T18:00:00.000Z
Patient, hospital data secure after cybersecurity incident

The Pembroke Regional Hospital says patient information and hospital data are secure following a cybersecurity incident June 24. Pembrokeย ...

2025-04-24T18:56:15.000Z
Providence Alaska Medical Center brings innovative cancer therapy to the 49th state

In 2025, researchers predict about 313,780 new diagnoses of prostate cancer and 34,770 deaths across the United States. But those cases aren't evenly spreadย ...

2025-03-25T07:00:00.000Z
CareView Communications Announces New Business Agreement with Alaska Native Medical Center

LEWISVILLE, Texas, March 25, 2025--CareView Communications, a leading provider of integrated virtual care solutions for the healthcareย ...

2025-01-28T08:00:00.000Z
Which Federal Programs Are Under Scrutiny? The Budget Office Named 2,600 of Them.

We identified programs in the OMB instructions by their assistance listing number, then used program titles and obligation totals for the most recent completeย ...

2024-07-19T07:00:00.000Z
Global tech outage ripples into Alaskaโ€™s 911, airport, hospital and court systems

A massive international technology outage knocked Alaska's emergency calling system offline for hours and disrupted air travel and otherย ...

2023-12-20T08:00:00.000Z
Nearly 3 million affected by ransomware attack on medical software firm

Millions of people across the U.S. had their information exposed following a ransomware attack on a company that provides software to hospitalsย ...

2024-07-19T07:00:00.000Z
Global tech outage hits airlines, banks, health care and public transit

A defective update from U.S. cybersecurity software company CrowdStrike crashed Microsoft Windows systems around the globe Friday.

2022-03-30T07:00:00.000Z
Native Americans' COVID-19 hospital mortality rates are double other races

American Indian and Alaska Native populations experienced in-hospital COVID-19 mortality rates two to three times higher than all other races.

2022-07-18T18:33:59.000Z
Sectra

Hospital for Special Surgery in New York City has pioneered a lot of innovation. This time it's digital pathology. They're all in with research and consultationย ...

similarCompanies

ARH Similar Companies

Duke Health Medical Staff Recruitment

The Duke Health Integrated Practice (DHIP) is a new clinical practice model that exists within DUHS. Physician members will become employees of this new, physician-led entity, and will integrate the most effective aspects of both organizations. DHIP also places special emphasis on including princi

Johns Hopkins Medicine

Johns Hopkins Medicine is a governing structure for the Universityโ€™s School of Medicine and the health system, coordinating their research, teaching, patient care, and related enterprises. The Johns Hopkins Hospital opened in 1889, followed four years later by the universityโ€™s School of Medicine

Atrium Health

Atrium Health is a nationally recognized leader in shaping health outcomes through innovative research, education and compassionate patient care. Based in Charlotte, North Carolina, Atrium Health is proud to be a part of Advocate Health, the third-largest nonprofit health system, serving nearly 6 mi

Cincinnati Children's

Cincinnati Childrenโ€™s, a nonprofit academic medical center established in 1883, offers services from well-child care to treatment for the most rare and complex conditions. It is the Department of Pediatrics at the University of Cincinnati College of Medicine and trains more than 600 residents and cl

IHH HEALTHCARE MALAYSIA

IHH Healthcare Malaysia is one of the largest private healthcare providers in Malaysia, with approximately 3,000 beds. Our healthcare network comprises 11 Pantai Hospitals, four Gleneagles Hospitals, Prince Court Medical Centre and Timberland Medical Centre, and is complemented by ancillary service

BrightSpring Health Services

BrightSpring is the parent company of a family of services and brands that provides clinical, nonclinical, pharmacy and ancillary care services for people of all ages, health and skill levels across home and community settings. The company is a leading provider of diversified home and community-ba

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ARH CyberSecurity History Information

How many cyber incidents has ARH faced?

Total Incidents: According to Rankiteo, ARH has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at ARH?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Ransomware.

How does ARH detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Kroll and third party assistance with forensic advisers, threat intelligence advisers and law enforcement notified with True.

Incident Details

Can you provide details on each incident?

Incident : Ransomware Attack

Title: Ransomware Attack on ESO Solutions

Description: ESO Solutions, a key software provider for healthcare and emergency services, was the victim of a ransomware attack. This cyberattack led to unauthorized data access and encryption of various company systems. The breach exposed a variety of personal information, depending on what patients had shared with their healthcare providers using ESOโ€™s software. Compromised data includes: Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers. It was confirmed that this breach affected data belonging to patients associated with ESOโ€™s client hospitals and clinics in the U.S. To help mitigate risks, ESO is offering a year of identity monitoring services through Kroll to all notified individuals.

Type: Ransomware Attack

Incident : Data Breach

Title: HCA Healthcare Data Breach

Description: A data breach at HCA Healthcare resulted in the exposure of about 11 million patients' personal data.

Date Detected: 2023-07-05

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware Attack ALA6595124

Data Compromised: Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers

Incident : Data Breach HCA25118923

Data Compromised: patient's name, city, state, zip code, email address, phone number, date of birth, gender, date and place of most recent service

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers and Personal Information.

Which entities were affected by each incident?

Incident : Ransomware Attack ALA6595124

Entity Type: Software Provider

Industry: Healthcare and Emergency Services

Location: U.S.

Incident : Data Breach HCA25118923

Entity Type: Healthcare Provider

Industry: Healthcare

Customers Affected: 11000000

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware Attack ALA6595124

Third Party Assistance: Kroll

Incident : Data Breach HCA25118923

Third Party Assistance: forensic advisers, threat intelligence advisers

Law Enforcement Notified: True

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Kroll, forensic advisers, threat intelligence advisers.

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware Attack ALA6595124

Type of Data Compromised: Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers

Sensitivity of Data: High

Personally Identifiable Information: True

Incident : Data Breach HCA25118923

Type of Data Compromised: Personal Information

Number of Records Exposed: 11000000

Data Exfiltration: True

Personally Identifiable Information: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware Attack ALA6595124

Data Encryption: True

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach HCA25118923

Investigation Status: ongoing

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Kroll, forensic advisers, threat intelligence advisers.

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2023-07-05.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers, patient's name, city, state, zip code, email address, phone number, date of birth, gender and date and place of most recent service.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll, forensic advisers, threat intelligence advisers.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Full names, Birth dates, Phone numbers, Patient account and medical record numbers, Injury, diagnosis, treatment, and procedure details, Social Security Numbers, patient's name, city, state, zip code, email address, phone number, date of birth, gender and date and place of most recent service.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 110.0.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge