
Global Communications & Professional Services, Inc. Company Cyber Security Posture
www.globalcomminc.comFounded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of whatโs possible, positioning ourselves at the forefront of the industry and shaping its future.
GC&PSI Company Details
globalcommunicationsinc
5 employees
15.0
517
Telecommunications
www.globalcomminc.com
Scan still pending
GLO_3328289
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Global Communications & Professional Services, Inc. Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Global Communications & Professional Services, Inc. Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Global Communications Inc. | Ransomware | 100 | 4 | 5/2025 | GLO845050725 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value. |
Global Communications & Professional Services, Inc. Company Subsidiaries

Founded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of whatโs possible, positioning ourselves at the forefront of the industry and shaping its future.
Access Data Using Our API

Get company history
.png)
GC&PSI Cyber Security News
EY US - Home | Building a better working world
We embrace our responsibility as independent auditors to perform high-quality audits that promote trust and confidence in the capital markets.
25 Best Managed Security Service Providers (MSSP) In 2025
25 Best Managed Security Service Providers (MSSP) in 2025 ยท 25. CenturyLink ยท 24. GoSecure ยท 23. BMC Mainframe ยท 22. Netsurion ยท 21. Anomalixย ...
Verizon Announces Strategic Partnership with Accenture to Help Organizations Tackle Emerging Cybersecurity Threats
To address the rapidly evolving cybersecurity landscape, Verizon Business and Accenture today announced a strategic partnership toย ...
Careers
Ready to join a mission that matters? Join our talent community. Go to job postings. Careers at CrowdStrike. Sales & Marketing. Engineering & Technology.
Exclusive Networks Announces an Important Step in Its U.S. and Services Growth Strategy With the Acquisition of Cloudrise
Cloudrise is a security services provider focused on protecting organizations' data โ wherever it resides. On prem, in the cloud, or anyplace inย ...
Digital Infrastructure Market Size, Share | CAGR of 27.20%
Digital Infrastructure Market is estimated to reach USD 4.55 Trillion By 2034, Fueled by a robust CAGR of 27.20% over the forecast period...
Deloitte ranked No. 1 in Security Services by revenue in Gartnerยฎ Security Services Worldwide 2023 Market Share report | Deloitte Global
Gartner has ranked Deloitte No.1 in its inaugural Security Services Worldwide 2023 Market Share report. This year's report has expanded toย ...
Accenture Expands Generative AI-Powered Cybersecurity Services and Capabilities to Accelerate Clientsโ Resilience and Reinvention
Accenture Security is a leading provider of end-to-end cybersecurity services, including strategy, protection, resilience and industry-specificย ...
Cyber Security Services | Cyber Risk
Kroll's elite cyber risk experts deliver end-to-end cyber security services for organizations in a wide range of sectors, across the globe. Learn how Krollย ...

GC&PSI Similar Companies

Vodafone
At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

Iusacell
Con el constante avance tecnolรณgico en cuanto a movilidad y tecnologรญa, las telecomunicaciones y la comunicaciรณn son pieza fundamental para mover a una persona o a un paรญs entero, en Grupo Iusacell, a travรฉs de innovaciรณn, constancia, tecnologรญa y todos los empleados sintonizados en el mismo canal,

Motorola Solutions
Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration thatโs critical for safer communities, safe

MTN
MTN is a pan-African mobile operator with the strategic intent of โLeading digital solutions for Africaโs progressโ. We have 288 million customers in 14 markets and are inspired by our belief that everyone deserves the benefits of a modern, connected life. Inspired by Africaโs potential, we are com

Orange
Orange is one of the worldโs leading telecommunications operators with sales of 43.5 billion euros in 2022 and 136,000 employees worldwide at 31 December 2022, including 75,000 employees in France. The Group has a total customer base of 287 million customers worldwide at 31 December 2022, including

Idea Cellular Ltd
Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
GC&PSI CyberSecurity History Information
How many cyber incidents has GC&PSI faced?
Total Incidents: According to Rankiteo, GC&PSI has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at GC&PSI?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
What was the total financial impact of these incidents on GC&PSI?
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
How does GC&PSI detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Engaged and law enforcement notified with Engaged and recovery measures with Forensic Investigations, Enhanced Security Training, Access Controls.
Incident Details
Can you provide details on each incident?

Incident : Ransomware and Data Breach
Title: Complex Assault on Global Communications Inc. by UNC3944
Description: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value.
Date Detected: Early 2023
Type: Ransomware and Data Breach
Attack Vector: Social Engineering
Vulnerability Exploited: Human (Help Desk Personnel)
Threat Actor: UNC3944
Motivation: Financial Gain and Data Theft
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Help Desk Personnel.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware and Data Breach GLO845050725
Financial Loss: Millions in recovery costs
Data Compromised: Personal Identifiers, Financial Account Details, Call Metadata
Systems Affected: Critical Network Infrastructure
Downtime: Significant Service Outages
Operational Impact: Halted Customer Billing Processes and Service Provisioning
Brand Reputation Impact: Widespread Loss of Consumer Trust
Legal Liabilities: Potential Class-Action Lawsuits
Identity Theft Risk: High
Payment Information Risk: High
What is the average financial loss per incident?
Average Financial Loss: The average financial loss per incident is $0.00.
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiers, Financial Account Details and Call Metadata.
Which entities were affected by each incident?

Incident : Ransomware and Data Breach GLO845050725
Entity Type: Telecommunications Provider
Industry: Telecommunications
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware and Data Breach GLO845050725
Third Party Assistance: Engaged
Law Enforcement Notified: Engaged
Recovery Measures: Forensic Investigations, Enhanced Security Training, Access Controls
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Engaged.
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware and Data Breach GLO845050725
Type of Data Compromised: Personal Identifiers, Financial Account Details, Call Metadata
Number of Records Exposed: Terabytes
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware and Data Breach GLO845050725
Ransom Demanded: Yes
Ransom Paid: No
Ransomware Strain: Custom
Data Encryption: Yes
Data Exfiltration: Yes
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Forensic Investigations, Enhanced Security Training, Access Controls.
Regulatory Compliance
Were there any regulatory violations and fines imposed for each incident?

Incident : Ransomware and Data Breach GLO845050725
Legal Actions: Potential Class-Action Lawsuits
How does the company ensure compliance with regulatory requirements?
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential Class-Action Lawsuits.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Ransomware and Data Breach GLO845050725
Investigation Status: Ongoing
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Ransomware and Data Breach GLO845050725
Entry Point: Help Desk Personnel
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Ransomware and Data Breach GLO845050725
Root Causes: Social Engineering and Human Error
Corrective Actions: Enhanced Security Training, Access Controls
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged.
What corrective actions has the company taken based on post-incident analysis?
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security Training, Access Controls.
Additional Questions
General Information
Has the company ever paid ransoms?
Ransom Payment History: The company has Paid ransoms in the past.
What was the amount of the last ransom demanded?
Last Ransom Demanded: The amount of the last ransom demanded was Yes.
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an UNC3944.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on Early 2023.
Impact of the Incidents
What was the highest financial loss from an incident?
Highest Financial Loss: The highest financial loss from an incident was Millions in recovery costs.
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Identifiers, Financial Account Details and Call Metadata.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Critical Network Infrastructure.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Identifiers, Financial Account Details and Call Metadata.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Ransomware Information
What was the highest ransom demanded in a ransomware incident?
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes.
What was the highest ransom paid in a ransomware incident?
Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.
Regulatory Compliance
What was the most significant legal action taken for a regulatory violation?
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential Class-Action Lawsuits.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Help Desk Personnel.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
