
CaptureRx Company Cyber Security Posture
capturerx.comFounded in 2000, San Antonio-based CaptureRx is a healthcare technology company and leading 340B solution provider that puts people first, touching millions of patient lives through customer obsession and innovative products and services that support relationships among payers, providers, pharmacies and patients. Our solutions manage inventory and financial flow for 340B prescriptions filled at contract pharmacies and perform the eligibility checks required to comply with 340B program requirements. Using a process thatโs seamless to the covered entity, pharmacy and patient, our Cumulus platform has processed more than 190 million patient encounters and more than 750 million switch claims. Currently, CaptureRx solutions serve more than 500 hospitals and health centers in 45 states via a robust pharmacy network of more than 3,500 contracted locations of independent, national and regional pharmacies. Support Center: Phone- 888-345-5745 Hours- 7AM-7PM CT Monday-Friday
CaptureRx Company Details
capturerx
129 employees
11056
62
Hospitals and Health Care
capturerx.com
Scan still pending
CAP_2442641
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

CaptureRx Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
CaptureRx Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
CaptureRx | Breach | 50 | 4 | 05/2021 | CAP2128311222 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: CaptureRx recently suffered from a data breach incident that exposed its electronic files. The investigation determined that certain files were accessed and acquired without authorization. At the time of the incident, the relevant files contained the first name, last name, date of birth, and prescription information. CaptureRx advises people to analyze account statements, explanation of benefits paperwork, and free credit reports for any strange behavior or inaccuracies while remaining watchful against identity theft and fraud. The list of "Steps You Can Take to Protect Personal Information" below offers additional actions people can take. | |||||||
CaptureRx | Ransomware | 100 | 6 | 05/2021 | CAP13123322 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Texas-based health IT company CaptureRx suffered a ransomware attack on its It systems. The attack compromised the patients' data of many hospitals and healthcare organizations that it manages. The compromised information includes files containing patient records, protected health information, names, birth dates, and prescription details. |
CaptureRx Company Subsidiaries

Founded in 2000, San Antonio-based CaptureRx is a healthcare technology company and leading 340B solution provider that puts people first, touching millions of patient lives through customer obsession and innovative products and services that support relationships among payers, providers, pharmacies and patients. Our solutions manage inventory and financial flow for 340B prescriptions filled at contract pharmacies and perform the eligibility checks required to comply with 340B program requirements. Using a process thatโs seamless to the covered entity, pharmacy and patient, our Cumulus platform has processed more than 190 million patient encounters and more than 750 million switch claims. Currently, CaptureRx solutions serve more than 500 hospitals and health centers in 45 states via a robust pharmacy network of more than 3,500 contracted locations of independent, national and regional pharmacies. Support Center: Phone- 888-345-5745 Hours- 7AM-7PM CT Monday-Friday
Access Data Using Our API

Get company history
.png)
CaptureRx Cyber Security News
CaptureRX faces bankruptcy if $4.75M settlement in healthcare breach lawsuit is not approved
NEC Networks, d/b/a CaptureRX, has reached a settlement with the 2.42 million patients whose data was stolen prior to a ransomware attack on theย ...
Ransomware attack on MetroHealth vendor compromises patient health data; other pharmacies affected
A ransomware attack earlier this year on a Texas-based company could have compromised the data of an unknown number of MetroHealth patients.
10 biggest healthcare data breaches of 2021 impact over 22.6M patients
The biggest healthcare data breaches reported in 2021 each impacted more than 1 million patients, with more than 22.64 million patients affected overall.

CaptureRx Similar Companies

Inova Health
Inova is Northern Virginiaโs leading nonprofit healthcare provider, offering world-class clinical excellence to everyone in our communities with a warm, human touch. Our 22,000+ team members collaborate to achieve individual and group health goals in partnership with every one of the 2M+ individuals

Sahlgrenska University Hospital
Sahlgrenska University Hospital (SU) provides emergency and basic care for the Gรยถteborg region, and its 700,000 inhabitants, and highly specialised care for West Sweden, with 1.7 million inhabitants. SU is also the countryรยดs centre for certain specialised care, especially in paediatrics (paediatri

OSF HealthCare
OSF HealthCare is an integrated health system founded by The Sisters of the Third Order of St. Francis. Headquartered in Peoria, Illinois, OSF HealthCare has 16 hospitals โ 10 acute care, five critical access, one transitional care โ with 2,134 licensed beds throughout Illinois and Michigan. OSF em

Health Care Service Corporation
Health Care Service Corporation serves nearly 23 million people across the United States through its portfolio of health benefit solutions. HCSC provides health coverage options for employers large and small, individuals and families, and Medicare and Medicaid plans. HCSC also offers related health

Lifespan
Lifespan, Rhode Island's first health system, was founded in 1994 by Rhode Island Hospital and The Miriam Hospital. A comprehensive, integrated, academic health system, Lifespanโs present partners also include RI Hospitalโs Hasbro Children's Hospital , Bradley Hospital, and Newport Hospital. A not

HCA Healthcare
HCA Healthcare is dedicated to giving people a healthier tomorrow. As one of the nationโs leading providers of healthcare services, HCA Healthcare is comprised of 188 hospitals and 2,400+ sites of care in 20 states and the United Kingdom. In addition to hospitals, sites of care include surgery cen

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
CaptureRx CyberSecurity History Information
How many cyber incidents has CaptureRx faced?
Total Incidents: According to Rankiteo, CaptureRx has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at CaptureRx?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Ransomware.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: CaptureRx Data Breach
Description: CaptureRx suffered a data breach incident that exposed its electronic files. Certain files were accessed and acquired without authorization, containing first name, last name, date of birth, and prescription information. CaptureRx advises people to monitor for identity theft and fraud.
Type: Data Breach

Incident : Ransomware Attack
Title: Ransomware Attack on CaptureRx
Description: Texas-based health IT company CaptureRx suffered a ransomware attack on its IT systems, compromising the patients' data of many hospitals and healthcare organizations that it manages.
Type: Ransomware Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach CAP2128311222
Data Compromised: first name, last name, date of birth, prescription information
Identity Theft Risk: High

Incident : Ransomware Attack CAP13123322
Data Compromised: patient records, protected health information, names, birth dates, prescription details
Systems Affected: IT systems
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, Health Information, patient records, protected health information, names, birth dates and prescription details.
Which entities were affected by each incident?

Incident : Ransomware Attack CAP13123322
Entity Type: Health IT Company
Industry: Healthcare
Location: Texas
Customers Affected: Many hospitals and healthcare organizations
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach CAP2128311222
Type of Data Compromised: Personally Identifiable Information, Health Information
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Incident : Ransomware Attack CAP13123322
Type of Data Compromised: patient records, protected health information, names, birth dates, prescription details
Sensitivity of Data: High
Personally Identifiable Information: names, birth dates
Lessons Learned and Recommendations
What recommendations were made to prevent future incidents?

Incident : Data Breach CAP2128311222
Recommendations: Monitor account statements, Monitor explanation of benefits paperwork, Monitor free credit reports, Remain watchful against identity theft and fraud
What recommendations has the company implemented to improve cybersecurity?
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Monitor account statements, Monitor explanation of benefits paperwork, Monitor free credit reports, Remain watchful against identity theft and fraud.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were first name, last name, date of birth, prescription information, patient records, protected health information, names, birth dates and prescription details.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was IT systems.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were first name, last name, date of birth, prescription information, patient records, protected health information, names, birth dates and prescription details.
Lessons Learned and Recommendations
What was the most significant recommendation implemented to improve cybersecurity?
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor account statements, Monitor explanation of benefits paperwork, Monitor free credit reports, Remain watchful against identity theft and fraud.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
