
Columbia Surgical Specialist of Spokane Company Cyber Security Posture
spokaneent.com"To be the premier surgical group in the region."โ -Board of Directors, November 2012
CSSS Company Details
columbia-surgical-specialist-of-spokane
42 employees
139.0
621
Medical Practices
spokaneent.com
Scan still pending
COL_2972165
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Columbia Surgical Specialist of Spokane Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Columbia Surgical Specialist of Spokane Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Columbia Surgical Specialist of Spokane | Breach | 50 | 4 | 03/2019 | COL32012323 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Columbia Surgical Specialists of Spokane notified that they have been impacted by a data breach which affected 400,000 patients. The incident was coded as a network/IT incident involving data on the network server. The Organization worked with a security firm to unlock its systems and recover its data without paying a ransom within a few days of the attack. Some of the impacted patient files were more than 20 years old, and the practice was still assessing how to notify various individuals as they have been moved or were deceased. |
Columbia Surgical Specialist of Spokane Company Subsidiaries

"To be the premier surgical group in the region."โ -Board of Directors, November 2012
Access Data Using Our API

Get company history
.png)
CSSS Cyber Security News
Ransomware Attack Impacts up to 400,000 Patients of Columbia Surgical Specialists of Spokane
A ransomware attack on Columbia Surgical Specialists of Spokane in Washington has potentially allowed unauthorized individuals to access theย ...
AI supports Medcurity's growth as it expands cyber defense
Medcurity's latest artificial intelligence-integrated software updates are giving the Spokane-based medical records technology company more timeย ...
Data of 45,000 Rush patients exposed due to third-party breach
The personal information of about 45,000 patients at Rush System for Health has been compromised due to a data breach at one of the healthย ...

CSSS Similar Companies

Hamad Medical Corporation
Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
CSSS CyberSecurity History Information
How many cyber incidents has CSSS faced?
Total Incidents: According to Rankiteo, CSSS has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at CSSS?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does CSSS detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Security firm and remediation measures with Systems unlocked and data recovered.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Columbia Surgical Specialists of Spokane
Description: Columbia Surgical Specialists of Spokane notified that they have been impacted by a data breach which affected 400,000 patients. The incident was coded as a network/IT incident involving data on the network server. The Organization worked with a security firm to unlock its systems and recover its data without paying a ransom within a few days of the attack. Some of the impacted patient files were more than 20 years old, and the practice was still assessing how to notify various individuals as they have been moved or were deceased.
Type: Data Breach
Attack Vector: Network/IT incident
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient files.
Which entities were affected by each incident?

Incident : Data Breach COL32012323
Entity Type: Medical Practice
Industry: Healthcare
Location: Spokane
Customers Affected: 400,000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach COL32012323
Third Party Assistance: Security firm
Remediation Measures: Systems unlocked and data recovered
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Security firm.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach COL32012323
Type of Data Compromised: Patient files
Number of Records Exposed: 400,000
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Systems unlocked and data recovered.
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Data Breach COL32012323
Ransom Paid: No
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Security firm.
Additional Questions
General Information
Has the company ever paid ransoms?
Ransom Payment History: The company has Paid ransoms in the past.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Patient files.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Network server.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Security firm.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Patient files.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 400.0K.
Ransomware Information
What was the highest ransom paid in a ransomware incident?
Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
