Global Communications & Professional Services, Inc. Company Cyber Security Posture

www.globalcomminc.com

Founded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of whatโ€™s possible, positioning ourselves at the forefront of the industry and shaping its future.

GC&PSI Company Details

Linkedin ID:

globalcommunicationsinc

Employees number:

5 employees

Number of followers:

15.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

www.globalcomminc.com

IP Addresses:

Scan still pending

Company ID:

GLO_3328289

Scan Status:

In-progress

AI scoreGC&PSI Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreGC&PSI Global Score
blurone
Ailogo

Global Communications & Professional Services, Inc. Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Global Communications & Professional Services, Inc. Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Global Communications Inc.Ransomware10045/2025GLO845050725Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value.

Global Communications & Professional Services, Inc. Company Subsidiaries

SubsidiaryImage

Founded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of whatโ€™s possible, positioning ourselves at the forefront of the industry and shaping its future.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=globalcommunicationsinc' -H 'apikey: YOUR_API_KEY_HERE'
newsone

GC&PSI Cyber Security News

2025-06-21T07:00:00.000Z
EY US - Home | Building a better working world

We embrace our responsibility as independent auditors to perform high-quality audits that promote trust and confidence in the capital markets.

2025-07-08T09:56:39.000Z
25 Best Managed Security Service Providers (MSSP) In 2025

25 Best Managed Security Service Providers (MSSP) in 2025 ยท 25. CenturyLink ยท 24. GoSecure ยท 23. BMC Mainframe ยท 22. Netsurion ยท 21. Anomalixย ...

2025-03-03T08:00:00.000Z
Verizon Announces Strategic Partnership with Accenture to Help Organizations Tackle Emerging Cybersecurity Threats

To address the rapidly evolving cybersecurity landscape, Verizon Business and Accenture today announced a strategic partnership toย ...

2024-10-01T14:48:55.000Z
Careers

Ready to join a mission that matters? Join our talent community. Go to job postings. Careers at CrowdStrike. Sales & Marketing. Engineering & Technology.

2024-11-21T08:00:00.000Z
Exclusive Networks Announces an Important Step in Its U.S. and Services Growth Strategy With the Acquisition of Cloudrise

Cloudrise is a security services provider focused on protecting organizations' data โ€” wherever it resides. On prem, in the cloud, or anyplace inย ...

2025-02-12T10:26:51.000Z
Digital Infrastructure Market Size, Share | CAGR of 27.20%

Digital Infrastructure Market is estimated to reach USD 4.55 Trillion By 2034, Fueled by a robust CAGR of 27.20% over the forecast period...

2024-08-06T07:00:00.000Z
Deloitte ranked No. 1 in Security Services by revenue in Gartnerยฎ Security Services Worldwide 2023 Market Share report | Deloitte Global

Gartner has ranked Deloitte No.1 in its inaugural Security Services Worldwide 2023 Market Share report. This year's report has expanded toย ...

2024-11-19T08:00:00.000Z
Accenture Expands Generative AI-Powered Cybersecurity Services and Capabilities to Accelerate Clientsโ€™ Resilience and Reinvention

Accenture Security is a leading provider of end-to-end cybersecurity services, including strategy, protection, resilience and industry-specificย ...

2025-06-28T13:34:10.000Z
Cyber Security Services | Cyber Risk

Kroll's elite cyber risk experts deliver end-to-end cyber security services for organizations in a wide range of sectors, across the globe. Learn how Krollย ...

similarCompanies

GC&PSI Similar Companies

Vodafone

At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

Iusacell

Con el constante avance tecnolรณgico en cuanto a movilidad y tecnologรญa, las telecomunicaciones y la comunicaciรณn son pieza fundamental para mover a una persona o a un paรญs entero, en Grupo Iusacell, a travรฉs de innovaciรณn, constancia, tecnologรญa y todos los empleados sintonizados en el mismo canal,

Motorola Solutions

Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration thatโ€™s critical for safer communities, safe

MTN is a pan-African mobile operator with the strategic intent of โ€˜Leading digital solutions for Africaโ€™s progressโ€™. We have 288 million customers in 14 markets and are inspired by our belief that everyone deserves the benefits of a modern, connected life. Inspired by Africaโ€™s potential, we are com

Orange

Orange is one of the worldโ€™s leading telecommunications operators with sales of 43.5 billion euros in 2022 and 136,000 employees worldwide at 31 December 2022, including 75,000 employees in France. The Group has a total customer base of 287 million customers worldwide at 31 December 2022, including

Idea Cellular Ltd

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GC&PSI CyberSecurity History Information

How many cyber incidents has GC&PSI faced?

Total Incidents: According to Rankiteo, GC&PSI has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at GC&PSI?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

What was the total financial impact of these incidents on GC&PSI?

Total Financial Loss: The total financial loss from these incidents is estimated to be $0.

How does GC&PSI detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Engaged and law enforcement notified with Engaged and recovery measures with Forensic Investigations, Enhanced Security Training, Access Controls.

Incident Details

Can you provide details on each incident?

Incident : Ransomware and Data Breach

Title: Complex Assault on Global Communications Inc. by UNC3944

Description: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value.

Date Detected: Early 2023

Type: Ransomware and Data Breach

Attack Vector: Social Engineering

Vulnerability Exploited: Human (Help Desk Personnel)

Threat Actor: UNC3944

Motivation: Financial Gain and Data Theft

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Help Desk Personnel.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware and Data Breach GLO845050725

Financial Loss: Millions in recovery costs

Data Compromised: Personal Identifiers, Financial Account Details, Call Metadata

Systems Affected: Critical Network Infrastructure

Downtime: Significant Service Outages

Operational Impact: Halted Customer Billing Processes and Service Provisioning

Brand Reputation Impact: Widespread Loss of Consumer Trust

Legal Liabilities: Potential Class-Action Lawsuits

Identity Theft Risk: High

Payment Information Risk: High

What is the average financial loss per incident?

Average Financial Loss: The average financial loss per incident is $0.00.

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiers, Financial Account Details and Call Metadata.

Which entities were affected by each incident?

Incident : Ransomware and Data Breach GLO845050725

Entity Type: Telecommunications Provider

Industry: Telecommunications

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware and Data Breach GLO845050725

Third Party Assistance: Engaged

Law Enforcement Notified: Engaged

Recovery Measures: Forensic Investigations, Enhanced Security Training, Access Controls

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Engaged.

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware and Data Breach GLO845050725

Type of Data Compromised: Personal Identifiers, Financial Account Details, Call Metadata

Number of Records Exposed: Terabytes

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware and Data Breach GLO845050725

Ransom Demanded: Yes

Ransom Paid: No

Ransomware Strain: Custom

Data Encryption: Yes

Data Exfiltration: Yes

How does the company recover data encrypted by ransomware?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Forensic Investigations, Enhanced Security Training, Access Controls.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident?

Incident : Ransomware and Data Breach GLO845050725

Legal Actions: Potential Class-Action Lawsuits

How does the company ensure compliance with regulatory requirements?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential Class-Action Lawsuits.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Ransomware and Data Breach GLO845050725

Investigation Status: Ongoing

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Ransomware and Data Breach GLO845050725

Entry Point: Help Desk Personnel

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Ransomware and Data Breach GLO845050725

Root Causes: Social Engineering and Human Error

Corrective Actions: Enhanced Security Training, Access Controls

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged.

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security Training, Access Controls.

Additional Questions

General Information

Has the company ever paid ransoms?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was Yes.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an UNC3944.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on Early 2023.

Impact of the Incidents

What was the highest financial loss from an incident?

Highest Financial Loss: The highest financial loss from an incident was Millions in recovery costs.

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal Identifiers, Financial Account Details and Call Metadata.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Critical Network Infrastructure.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Identifiers, Financial Account Details and Call Metadata.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes.

What was the highest ransom paid in a ransomware incident?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential Class-Action Lawsuits.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Help Desk Personnel.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge