
Betty Jean Kerr People's Health Centers Company Cyber Security Posture
phcenters.orgPeopleโs Health Centers is committed to providing culturally sensitive quality health care with dignity, respect and compassion, in a high-performance organization staffed by competent professionals grounded in the principles of customer service.
BJKPHC Company Details
betty-jean-kerry-peoples-health-centers
20 employees
76
62
Hospitals and Health Care
phcenters.org
Scan still pending
BET_9887432
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Betty Jean Kerr People's Health Centers Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Betty Jean Kerr People's Health Centers Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Betty Jean Kerr People's Health Centers | Breach | 50 | 4 | 10/2019 | BET25817423 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The Betty Jean Kerr Peopleโs Health Center was hit by a data breach that potentially affected 152,000 people. The Organization said that the attack involved patient information such as addresses and social security numbers, but no patient medical records. Information on medical providers and health center employees also was breached. Although it's unknown whether the information that has been locked in their system has actually been viewed or accessed by this foreign actor. It was determined that the data involved has included patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information and dental x-rays. |
Betty Jean Kerr People's Health Centers Company Subsidiaries

Peopleโs Health Centers is committed to providing culturally sensitive quality health care with dignity, respect and compassion, in a high-performance organization staffed by competent professionals grounded in the principles of customer service.
Access Data Using Our API

Get company history
.png)
BJKPHC Cyber Security News
St. Louis health centers hit by ransomware; data of 152,000 at risk
St. Louis health centers hit by ransomware; data of 152,000 at risk. Betty Jean Kerr People's Health Centers still does not have access to someย ...
Nebraska Medicine Breached By Rogue Employee
Nebraska Medicine Breached By Rogue Employee ยท Ticketmaster Coughs Up $10 Million Fine After Hacking Rival Business ยท Fired Healthcare Execย ...

BJKPHC Similar Companies

IHH HEALTHCARE MALAYSIA
IHH Healthcare Malaysia is one of the largest private healthcare providers in Malaysia, with approximately 3,000 beds. Our healthcare network comprises 11 Pantai Hospitals, four Gleneagles Hospitals, Prince Court Medical Centre and Timberland Medical Centre, and is complemented by ancillary service

Brookdale
Relationships are the heart of our culture. They help us create a sense of family among our residents, associates and patients. Integrity is our soul. It guides us to be open in our communication with each other, and it enables us to make the right decisions for the people who have entrusted us with

Ochsner Health
Ochsner Health is the leading nonprofit healthcare provider in the Gulf South, delivering expert care at its 46 hospitals and more than 370 health and urgent care centers. For 13 consecutive years, U.S. News & World Report has recognized Ochsner as the No. 1 hospital in Louisiana. Additionally, Ochs

OSF HealthCare
OSF HealthCare is an integrated health system founded by The Sisters of the Third Order of St. Francis. Headquartered in Peoria, Illinois, OSF HealthCare has 16 hospitals โ 10 acute care, five critical access, one transitional care โ with 2,134 licensed beds throughout Illinois and Michigan. OSF em

Geisinger
Geisinger is among the nationโs leading providers of value-based care, serving 1.2 million people in urban and rural communities across Pennsylvania. Founded in 1915 by philanthropist Abigail Geisinger, the nonprofit system generates $10 billion in annual revenues across 126 care sites โ including 1

UnitedHealthcare
When it comes to your health, everything matters. Thatโs why UnitedHealthcare is helping people live healthier lives and making the health system work better for everyone. Our health plans are there for you in moments big and small, delivering a simple experience, affordable coverage, and supportive

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
BJKPHC CyberSecurity History Information
How many cyber incidents has BJKPHC faced?
Total Incidents: According to Rankiteo, BJKPHC has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at BJKPHC?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Betty Jean Kerr Peopleโs Health Center
Description: The Betty Jean Kerr Peopleโs Health Center was hit by a data breach that potentially affected 152,000 people. The attack involved patient information such as addresses and social security numbers, but no patient medical records. Information on medical providers and health center employees was also breached.
Type: Data Breach
Threat Actor: foreign actor
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach BET25817423
Data Compromised: patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information, dental x-rays
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information and dental x-rays.
Which entities were affected by each incident?

Incident : Data Breach BET25817423
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 152,000
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach BET25817423
Type of Data Compromised: patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information, dental x-rays
Number of Records Exposed: 152,000
Sensitivity of Data: High
Personally Identifiable Information: patient names, dates of birth, addresses, social security numbers
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an foreign actor.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information and dental x-rays.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were patient names, dates of birth, addresses, social security numbers, limited clinical data, pharmacy data, insurance information and dental x-rays.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 152.0K.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
