
Cox Enterprises Company Cyber Security Posture
coxenterprises.comThousands of employees, one goal: empower people today to build a better future for the next generation. How do we do that? By disrupting industries. By treating our employees as our most important resource. By improving the quality of life in our communities and by protecting our planet. We create a culture with flexible career growth, generous benefits and an environment where youโre empowered to make time for teammates, family, friends and yourself. Founded in 1898, Coxโs legacy of innovation continues to drive us forward today. We know great things never came from comfort zones. Today weโre powering smart cities with powerhouse broadband communications, pioneering greener modes of transportation and hatching new technologies to slash the glut of global waste. Through our investments and our major divisions โ Cox Communications and Cox Automotive โ weโre focused on the future of mobility, connectivity and sustainability. We are a global, family-owned organization with a purpose. Come build a better future with us and make your mark.
Cox Enterprises Company Details
cox-enterprises
39919 employees
113212.0
51
Technology, Information and Media
coxenterprises.com
Scan still pending
COX_6514943
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Cox Enterprises Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Cox Enterprises Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Cox Communications | Breach | 90 | 4 | 12/2021 | COX152930322 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Cox Communications, a large cable company recently suffered a data breach incident in December 2021. The attackers impersonated a Cox agent through a social engineering attack and managed to access the company's customer data. The compromised data includes address, telephone number, Cox account number, usernames, and other personal information of the customers. The company with the help of cyber security experts investigated the attack and secured its data from such future attacks and notified the affected customers of the breach. | |||||||
Cox Communications | Cyber Attack | 100 | 6 | 09/2022 | COX2035161122 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Cox Communications suffered a cyber attack that caused an internet outage that affected the Tucson region. no customer information was compromised in the attack. however, the Cox says their efforts to stop the attack were the reason for the internet outage. | |||||||
Autotrader US | Data Leak | 50 | 2 | 01/2023 | AUT221524123 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: In January 2023, 1.4M records from the Autotrader online vehicle marketplace appeared on a popular hacking forum. The data relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods. The data contained 20k unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers. |
Cox Enterprises Company Subsidiaries

Thousands of employees, one goal: empower people today to build a better future for the next generation. How do we do that? By disrupting industries. By treating our employees as our most important resource. By improving the quality of life in our communities and by protecting our planet. We create a culture with flexible career growth, generous benefits and an environment where youโre empowered to make time for teammates, family, friends and yourself. Founded in 1898, Coxโs legacy of innovation continues to drive us forward today. We know great things never came from comfort zones. Today weโre powering smart cities with powerhouse broadband communications, pioneering greener modes of transportation and hatching new technologies to slash the glut of global waste. Through our investments and our major divisions โ Cox Communications and Cox Automotive โ weโre focused on the future of mobility, connectivity and sustainability. We are a global, family-owned organization with a purpose. Come build a better future with us and make your mark.
Access Data Using Our API

Get company history
.png)
Cox Enterprises Cyber Security News
Cox Enterprises Careers, Perks + Culture
For well over a century, Cox Enterprises has been shaping the future with daring ideas and values-driven thinking.
Table of Experts: Cybersecurity
Why is cybersecurity more important than it's ever been, and why should businesses pay attention?
Top 10 Tech Companies to Work for in San Diego in 2025
Discover the top 10 tech companies in San Diego to work for in 2025, offering innovation, growth, and employee satisfaction.
The Weekโs Biggest Funding Rounds: Scale AI Tops Busy Week For AI Investment
It was another big week for AI-related funding, topped off by Scale AI's massive new investment from Meta. We also saw big rounds for startupsย ...
Cyberattacks โ Itโs not if but when
Cyber-attacks on small and medium-sized businesses are not only increasing, but they are also becoming more targeted and sophisticated.
Cable Giants Charter and Cox to Merge in $34.5 Billion Deal
The cable giants Charter Communications and Cox Communications said on Friday that they had agreed to merge, a colossal deal that would create one of theย ...
Spring Cleaning: Legislative Plans for Cybersecurity, Business Data, AI, and e-Evidence
The Government published its new Legislation Programme setting out legislation to be published or drafted as a priority this Spring 2025.
Collaboration makes cybersecurity stronger
A privately held and diversified company, Cox Enterprises is the holding company for both Cox Communications and Cox Automotive, as well asย ...
How Cox Enterprises is shaping its sustainable supply chain
Clarence Jackson of Cox Enterprises explains how a company that relies heavily on contractors still makes a positive environmental impact. Learn more.

Cox Enterprises Similar Companies

Globo
A globo โยฉ feita de gente que quer fazer diferente, fazer junto, fazer o futuro. Gente espalhada por todo o paโโ s (e mundo!) trabalhando com conteโโซdo, notโโ cias, negโโฅcios, tecnologia e brasilidade de sobra. Canais na TV aberta e por assinatura, produtos digitais como globoplay, Cartola, g1, ge,

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Cox Enterprises CyberSecurity History Information
How many cyber incidents has Cox Enterprises faced?
Total Incidents: According to Rankiteo, Cox Enterprises has faced 3 incidents in the past.
What types of cybersecurity incidents have occurred at Cox Enterprises?
Incident Types: The types of cybersecurity incidents that have occurred incidents Cyber Attack, Data Leak and Breach.
How does Cox Enterprises detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Efforts to stop the attack and incident response plan activated with True and third party assistance with Cyber security experts and recovery measures with Investigated the attack and secured its data from such future attacks and communication strategy with Notified the affected customers of the breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Autotrader Data Breach
Description: In January 2023, 1.4 million records from the Autotrader online vehicle marketplace appeared on a popular hacking forum. The data relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods. The data contained 20,000 unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers.
Date Detected: 2023-01-01
Type: Data Breach
Attack Vector: Automated Collection Methods
Vulnerability Exploited: Publicly Available Data

Incident : Cyber Attack
Title: Cyber Attack on Cox Communications
Description: Cox Communications suffered a cyber attack that caused an internet outage affecting the Tucson region. No customer information was compromised in the attack. The efforts to stop the attack were the reason for the internet outage.
Type: Cyber Attack

Incident : Data Breach
Title: Cox Communications Data Breach
Description: Cox Communications suffered a data breach incident in December 2021 where attackers impersonated a Cox agent through a social engineering attack and accessed customer data.
Date Detected: December 2021
Type: Data Breach
Attack Vector: Social Engineering
Vulnerability Exploited: Human vulnerability through impersonation
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach AUT221524123
Data Compromised: Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers

Incident : Cyber Attack COX2035161122
Systems Affected: Internet Services
Downtime: Internet Outage
Operational Impact: Internet Services Disrupted

Incident : Data Breach COX152930322
Data Compromised: Address, Telephone number, Cox account number, Usernames, Other personal information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers, Address, Telephone number, Cox account number, Usernames and Other personal information.
Which entities were affected by each incident?

Incident : Cyber Attack COX2035161122
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: Tucson Region
Response to the Incidents
What measures were taken in response to each incident?

Incident : Cyber Attack COX2035161122
Containment Measures: Efforts to stop the attack

Incident : Data Breach COX152930322
Incident Response Plan Activated: True
Third Party Assistance: Cyber security experts
Recovery Measures: Investigated the attack and secured its data from such future attacks
Communication Strategy: Notified the affected customers of the breach
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Cyber security experts.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach AUT221524123
Type of Data Compromised: Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers
Number of Records Exposed: 1,400,000
Data Exfiltration: True
Personally Identifiable Information: True

Incident : Data Breach COX152930322
Type of Data Compromised: Address, Telephone number, Cox account number, Usernames, Other personal information
Personally Identifiable Information: True
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Efforts to stop the attack.
Ransomware Information
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Investigated the attack and secured its data from such future attacks.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Notified the affected customers of the breach.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cyber security experts.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2023-01-01.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers, Address, Telephone number, Cox account number, Usernames and Other personal information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Internet Services.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cyber security experts.
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Efforts to stop the attack.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers, Address, Telephone number, Cox account number, Usernames and Other personal information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.4M.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
