Columbia Surgical Specialist of Spokane Company Cyber Security Posture

spokaneent.com

"To be the premier surgical group in the region."โ€‹ -Board of Directors, November 2012

CSSS Company Details

Linkedin ID:

columbia-surgical-specialist-of-spokane

Employees number:

42 employees

Number of followers:

139.0

NAICS:

621

Industry Type:

Medical Practices

Homepage:

spokaneent.com

IP Addresses:

Scan still pending

Company ID:

COL_2972165

Scan Status:

In-progress

AI scoreCSSS Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Columbia Surgical Specialist of Spokane Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Columbia Surgical Specialist of Spokane Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Columbia Surgical Specialist of SpokaneBreach50403/2019COL32012323Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Columbia Surgical Specialists of Spokane notified that they have been impacted by a data breach which affected 400,000 patients. The incident was coded as a network/IT incident involving data on the network server. The Organization worked with a security firm to unlock its systems and recover its data without paying a ransom within a few days of the attack. Some of the impacted patient files were more than 20 years old, and the practice was still assessing how to notify various individuals as they have been moved or were deceased.

Columbia Surgical Specialist of Spokane Company Subsidiaries

SubsidiaryImage

"To be the premier surgical group in the region."โ€‹ -Board of Directors, November 2012

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=columbia-surgical-specialist-of-spokane' -H 'apikey: YOUR_API_KEY_HERE'
newsone

CSSS Cyber Security News

2019-03-06T08:00:00.000Z
Ransomware Attack Impacts up to 400,000 Patients of Columbia Surgical Specialists of Spokane

A ransomware attack on Columbia Surgical Specialists of Spokane in Washington has potentially allowed unauthorized individuals to access theย ...

2024-02-15T08:00:00.000Z
AI supports Medcurity's growth as it expands cyber defense

Medcurity's latest artificial intelligence-integrated software updates are giving the Spokane-based medical records technology company more timeย ...

2019-03-06T08:00:00.000Z
Data of 45,000 Rush patients exposed due to third-party breach

The personal information of about 45,000 patients at Rush System for Health has been compromised due to a data breach at one of the healthย ...

similarCompanies

CSSS Similar Companies

Hamad Medical Corporation

Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CSSS CyberSecurity History Information

How many cyber incidents has CSSS faced?

Total Incidents: According to Rankiteo, CSSS has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at CSSS?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does CSSS detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Security firm and remediation measures with Systems unlocked and data recovered.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Breach at Columbia Surgical Specialists of Spokane

Description: Columbia Surgical Specialists of Spokane notified that they have been impacted by a data breach which affected 400,000 patients. The incident was coded as a network/IT incident involving data on the network server. The Organization worked with a security firm to unlock its systems and recover its data without paying a ransom within a few days of the attack. Some of the impacted patient files were more than 20 years old, and the practice was still assessing how to notify various individuals as they have been moved or were deceased.

Type: Data Breach

Attack Vector: Network/IT incident

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach COL32012323

Data Compromised: Patient files

Systems Affected: Network server

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient files.

Which entities were affected by each incident?

Incident : Data Breach COL32012323

Entity Type: Medical Practice

Industry: Healthcare

Location: Spokane

Customers Affected: 400,000

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach COL32012323

Third Party Assistance: Security firm

Remediation Measures: Systems unlocked and data recovered

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Security firm.

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach COL32012323

Type of Data Compromised: Patient files

Number of Records Exposed: 400,000

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Systems unlocked and data recovered.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Data Breach COL32012323

Ransom Paid: No

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Security firm.

Additional Questions

General Information

Has the company ever paid ransoms?

Ransom Payment History: The company has Paid ransoms in the past.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was Patient files.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Network server.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Security firm.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Patient files.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 400.0K.

Ransomware Information

What was the highest ransom paid in a ransomware incident?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge