
Anaheim Majestic Garden Hotel Company Cyber Security Posture
majesticgardenhotel.comIn the overwhelming world of Anaheim hotels, there’s one escape that’s the ideal base camp for your Disneyland® adventures: the castle-themed Majestic Garden Hotel. The crown jewel of theme parks is just a half-mile away on our free Dream Machine shuttle bus. Disneyland® Resort Park Hopper® Tickets can be purchased in our hotel lobby at our Disney Desk (translation, no lines!) Beyond the castle entry, you’ll find Anaheim’s largest rooms, a pool, bar, restaurant, and 13 acres of tranquil gardens, ideal havens for unwinding from a day of Disneyland® Park fun.
AMGH Company Details
anaheim-majestic-garden-hotel
46 employees
222.0
721
Hospitality
majesticgardenhotel.com
Scan still pending
ANA_2984625
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Anaheim Majestic Garden Hotel Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Anaheim Majestic Garden Hotel Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Anaheim Majestic Garden Hotel | Breach | 60 | 2 | 8/2016 | ANA040072425 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: The California Office of the Attorney General reported a data breach involving the Anaheim Majestic Garden Hotel on December 22, 2017. The breach involved unauthorized access to payment card information and certain reservation details, with the breach occurring between August 10, 2016, and March 9, 2017. |
Anaheim Majestic Garden Hotel Company Subsidiaries

In the overwhelming world of Anaheim hotels, there’s one escape that’s the ideal base camp for your Disneyland® adventures: the castle-themed Majestic Garden Hotel. The crown jewel of theme parks is just a half-mile away on our free Dream Machine shuttle bus. Disneyland® Resort Park Hopper® Tickets can be purchased in our hotel lobby at our Disney Desk (translation, no lines!) Beyond the castle entry, you’ll find Anaheim’s largest rooms, a pool, bar, restaurant, and 13 acres of tranquil gardens, ideal havens for unwinding from a day of Disneyland® Park fun.
Access Data Using Our API

Get company history
.png)
AMGH Cyber Security News
Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab
Data from sensors that detect threats in critical infrastructure networks is sitting unanalyzed after a government contract expired this weekend ...
Introducing the smarter, more sophisticated Malwarebytes Trusted Advisor, your cybersecurity personal assistant
Malwarebytes Trusted Advisor has had an update, and it's now sharper, smarter, and more helpful than ever.
Trump AI plan calls for cybersecurity assessments, threat info-sharing
The U.S. government will expand information sharing, cyber risk evaluations and guidance to the private sector to address the cybersecurity ...
Microsoft Used China-Based Support for Multiple U.S. Agencies, Potentially Exposing Sensitive Data
Microsoft says it will no longer use China-based engineers to support the Pentagon. But ProPublica found that the tech giant has relied on ...
Deadline nears to extend ‘critical’ cyber info sharing law
Questions around the process for reauthorizing the Cybersecurity Information Sharing Act of 2015 have developed into a crucial early test for ...
Automated mobile robots are a cybersecurity risk
Like every software-driven and internet-connected system, robotic automation requires insightful protection. Here's what you need to know.
Outtake’s agents resolve cybersecurity attacks in hours with OpenAI
Outtake's cybersecurity agents automate detection and remediation with speed and precision enterprise security teams can trust.
Recommendation to Extend the ER-01 Cybersecurity Deadline for CCTV Systems in ITS
The ITS India Forum fully supports the intent of the ER-01 mandate - effective April 9, 2025 - to safeguard national security from substandard ...
Israeli-founded cyber startup set to be snapped up by Datadog in $1 billion deal
Upwind has developed a platform to protect businesses from malicious hackers by identifying risks and addressing their most critical ...

AMGH Similar Companies

China National Travel Service (HK) Group Corporation
The China Travel Service (Holdings) Limited is the backbone of the state-owned enterprise directly supervise by Central government. It is also the largest travel corporation in China and was established in April 1928 by Chinese banker Chen Guangfu. From generation to generation, it is now a large st

Hampton
The Hampton brand, including Hampton Inn, Hampton Inn & Suites and Hampton by Hilton, is an award-winning leader in the upper-midscale hotel segment. With more than 2,700 properties in 32 countries globally, Hampton is part of Hilton Worldwide, the leading global hospitality company. All Hampton Hot

Landry's
Landry's is a multinational, diversified restaurant, hospitality, gaming, and entertainment leader based in Houston, Texas. The company operates more than 600 establishments around the world, including well-known concepts, such as Landry’s Seafood House, Bubba Gump Shrimp Co., Rainforest Cafe, Mo

Radisson Hotel Group
Radisson Hotel Group is an international hotel group, operating in EMEA and APAC with over 1,320 hotels in operation and under development in +95 countries. The international hotel group is rapidly expanding with a plan to significantly grow the portfolio. The Group’s overarching brand promise is Ev

IHG Hotels & Resorts
IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. With a family of 19 hotel brands and IHG One Rewards, one of the world's largest hotel loyalty programmes, IHG has over 6,300 open hotels in more than 100 countries,

Caesars Entertainment
Caesars Entertainment, Inc. is the largest casino-entertainment Company in the U.S. and one of the world's most diversified casino-entertainment providers. Since its beginning in Reno, NV, in 1937, Caesars Entertainment, Inc. has grown through development of new resorts, expansions and acquisitions.

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
AMGH CyberSecurity History Information
How many cyber incidents has AMGH faced?
Total Incidents: According to Rankiteo, AMGH has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at AMGH?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Anaheim Majestic Garden Hotel
Description: Unauthorized access to payment card information and certain reservation details.
Date Detected: 2017-12-22
Date Publicly Disclosed: 2017-12-22
Type: Data Breach
Attack Vector: Unauthorized Access
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach ANA040072425
Data Compromised: Payment card information, Reservation details
Payment Information Risk: True
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card information and Reservation details.
Which entities were affected by each incident?

Incident : Data Breach ANA040072425
Entity Type: Hotel
Industry: Hospitality
Location: Anaheim, California
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach ANA040072425
Type of Data Compromised: Payment card information, Reservation details
References
Where can I find more information about each incident?

Incident : Data Breach ANA040072425
Source: California Office of the Attorney General
Date Accessed: 2017-12-22
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2017-12-22.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2017-12-22.
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-12-22.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Payment card information and Reservation details.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Payment card information and Reservation details.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
