Five Rivers Health Centers Company Cyber Security Posture

fiverivershealthcenters.org

The Five Rivers Health Center is an expanding Federal Qualified Health Center located in Dayton and Xenia, Ohio providing a medical home for low-income patients. Our growing organization empowers staff to make a difference every day in the lives of others and is committed to provide quality, cost-effective care for our patients and community, with respect and dignity, without regard of ability to pay.

FRHC Company Details

Linkedin ID:

five-rivers-health-centers

Employees number:

131 employees

Number of followers:

566.0

NAICS:

621

Industry Type:

Medical Practices

Homepage:

fiverivershealthcenters.org

IP Addresses:

Scan still pending

Company ID:

FIV_3026429

Scan Status:

In-progress

AI scoreFRHC Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Five Rivers Health Centers Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Five Rivers Health Centers Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Five Rivers Health CentersBreach60406/2021FIV215214123Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Five Rivers Health Centers suffered from data breach incident that affected 155,748 patients after phishing incident. The compromised information includes names, dates of birth, addresses, Medical Record Number (MRN), Patient Account Number (PAN), medical diagnosis, treatment and/or clinical information, test results or lab reports, provider name, date of service, treatment cost information, prescription information, health insurance information and/or policy numbers, and Medicaid or Medicare numbers. Financial account numbers, payment card numbers, driverโ€™s license or state identification number, and/or Social Security number for a limited number of individuals were also included in the impacted accounts. This incident did not affect all clients of Five Rivers and not all information was included for all individuals. They investigated the incident and have taken many precautions to safeguard it and continually evaluate and modify practices to enhance the security and privacy of personal information.

Five Rivers Health Centers Company Subsidiaries

SubsidiaryImage

The Five Rivers Health Center is an expanding Federal Qualified Health Center located in Dayton and Xenia, Ohio providing a medical home for low-income patients. Our growing organization empowers staff to make a difference every day in the lives of others and is committed to provide quality, cost-effective care for our patients and community, with respect and dignity, without regard of ability to pay.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=five-rivers-health-centers' -H 'apikey: YOUR_API_KEY_HERE'
newsone

FRHC Cyber Security News

2023-01-10T21:36:15.000Z
Gina McFarlane-El

Gina McFarlane-El is a member of the Cincinnati Board of Directors.

similarCompanies

FRHC Similar Companies

Hamad Medical Corporation

Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

FRHC CyberSecurity History Information

How many cyber incidents has FRHC faced?

Total Incidents: According to Rankiteo, FRHC has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at FRHC?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Breach at Five Rivers Health Centers

Description: Five Rivers Health Centers suffered from data breach incident that affected 155,748 patients after phishing incident.

Type: Data Breach

Attack Vector: Phishing

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach FIV215214123

Data Compromised: Names, Dates of birth, Addresses, Medical Record Number (MRN), Patient Account Number (PAN), Medical diagnosis, Treatment and/or clinical information, Test results or lab reports, Provider name, Date of service, Treatment cost information, Prescription information, Health insurance information and/or policy numbers, Medicaid or Medicare numbers, Financial account numbers, Payment card numbers, Driverโ€™s license or state identification number, Social Security number

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Medical Information and Financial Information.

Which entities were affected by each incident?

Incident : Data Breach FIV215214123

Entity Type: Healthcare

Industry: Healthcare

Customers Affected: 155,748

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach FIV215214123

Type of Data Compromised: Personal Information, Medical Information, Financial Information

Number of Records Exposed: 155,748

Sensitivity of Data: High

Personally Identifiable Information: True

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of birth, Addresses, Medical Record Number (MRN), Patient Account Number (PAN), Medical diagnosis, Treatment and/or clinical information, Test results or lab reports, Provider name, Date of service, Treatment cost information, Prescription information, Health insurance information and/or policy numbers, Medicaid or Medicare numbers, Financial account numbers, Payment card numbers, Driverโ€™s license or state identification number and Social Security number.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Dates of birth, Addresses, Medical Record Number (MRN), Patient Account Number (PAN), Medical diagnosis, Treatment and/or clinical information, Test results or lab reports, Provider name, Date of service, Treatment cost information, Prescription information, Health insurance information and/or policy numbers, Medicaid or Medicare numbers, Financial account numbers, Payment card numbers, Driverโ€™s license or state identification number and Social Security number.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 155.7K.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge