Health Sciences Authority Company Cyber Security Posture

hsa.gov.sg

The Health Sciences Authority (HSA) applies medical, pharmaceutical and scientific expertise through its three professional groups, Health Products Regulation, Blood Services and Applied Sciences, to protect and advance national health and safety. HSA is a multidisciplinary authority. It serves as the national regulator for health products, ensuring they are wisely regulated to meet standards of safety, quality and efficacy. As the national blood service, it is responsible for providing a safe and adequate blood supply. It also applies specialised scientific, forensic, investigative and analytical capabilities in serving the administration of justice.

HSA Company Details

Linkedin ID:

health-sciences-authority

Employees number:

501-1,000 employees

Number of followers:

0

NAICS:

922

Industry Type:

Public Safety

Homepage:

hsa.gov.sg

IP Addresses:

Scan still pending

Company ID:

HEA_1253182

Scan Status:

In-progress

AI scoreHSA Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Health Sciences Authority Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Health Sciences Authority Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Health Sciences AuthorityData Leak85303/2017HEA15589323Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The personal information of more than 800,000 people who have donated or registered to donate blood in Singapore since 1986 was improperly put online by the Health Sciences Authority (HSA). HSA said its preliminary findings indicate that there was only one instance of external access - by a cyber security expert who alerted the Personal Data Protection Commission to it a day later. It immediately took steps to verify that no sensitive medical or contact information was contained in the database. HSA added that the cyber security consultant who accessed the data had told them he did not intend to disclose it and worked with the agency to delete the information.

Health Sciences Authority Company Subsidiaries

SubsidiaryImage

The Health Sciences Authority (HSA) applies medical, pharmaceutical and scientific expertise through its three professional groups, Health Products Regulation, Blood Services and Applied Sciences, to protect and advance national health and safety. HSA is a multidisciplinary authority. It serves as the national regulator for health products, ensuring they are wisely regulated to meet standards of safety, quality and efficacy. As the national blood service, it is responsible for providing a safe and adequate blood supply. It also applies specialised scientific, forensic, investigative and analytical capabilities in serving the administration of justice.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=health-sciences-authority' -H 'apikey: YOUR_API_KEY_HERE'
newsone

HSA Cyber Security News

2025-03-17T07:00:00.000Z
Asia-Pacific Roundup: Singaporeโ€™s HSA seeks feedback on medical device cybersecurity best practices

HSA expects manufacturers to offer โ€œcomprehensive cybersecurity supportโ€ to healthcare providers in the first post-market stage. At that stage,ย ...

2025-04-05T07:00:00.000Z
Singapore: Health Sciences Authority launches public consultation on the Best Practices Guide for Medical Device Cybersecurity

The document provides medical device manufacturers and healthcare providers with best practice recommendations and considerations on generalย ...

2024-10-17T07:00:00.000Z
CSA launches cybersecurity labelling scheme for medical devices

The scheme seeks to improve medical device security by incentivising manufacturers to adopt a security-by-design approach. It will enableย ...

2024-10-16T07:00:00.000Z
Launch of Cybersecurity Labelling Scheme for Medical Devices

The scheme seeks to improve medical device security by incentivising manufacturers to adopt a security-by-design approach. It will enableย ...

2024-08-09T07:00:00.000Z
Federal Authorities Work to Boost Health-Care Cybersecurity

Ransomware attacks against the health-care sector put lives at risk โ€” and they're getting worse. But federal authorities are providing freeย ...

2024-12-18T08:00:00.000Z
Singapore: Health Sciences Authority cracks down on 3,300 e-commerce listings for illegal health products

In its press release, the HSA reiterated the harsh penalties for persons found to be selling illegal health products. If convicted for theย ...

2024-10-17T07:00:00.000Z
Singapore releases guidelines for securing AI systems and prohibiting deepfakes in elections

Singapore made a slew of cybersecurity announcements this week, including guidelines on securing artificial intelligence (AI) systems, a safetyย ...

2024-10-16T07:00:00.000Z
Singapore launches scheme to rate medical devices based on cyber-security provisions

SINGAPORE โ€“ Makers of medical devices can join a new scheme to have their products rated to see if they meet cyber-security standards thatย ...

2025-01-21T13:30:35.000Z
About Cybersecurity Labelling Scheme for Medical Devices - CLS(MD)

The scheme is part of Singapore's efforts to enhance cybersecurity in the healthcare sector, improve cyber hygiene, and safeguard Singapore's cyberspace asย ...

similarCompanies

HSA Similar Companies

Belgische federale politie

Belgische federale politie Alle informatie over deze publieke onderneming is terug te vinden op http://www.fedpol.be Het Belgische politielandschap wordt gevormd door een geรฏntegreerde politie met een lokale en een federale component. De federale politie verzorgt de gespecialiseerde steun aan

DNV is the independent expert in risk management and assurance, operating in more than 100 countries. Through its broad experience and deep expertise DNV advances safety and sustainable performance, sets industry benchmarks, and inspires and invents solutions. Whether assessing a new ship design,

Bundesministerium fโˆšยบr Inneres (BMI)

Das Bundesministerium fโˆšยบr Inneres (BMI) ist die Sicherheitsbehโˆšโˆ‚rde III. Instanz. Leiter ist der Bundesminister fโˆšยบr Inneres, derzeit Mag. Gerhard Karner. Das BMI ist zustโˆšยงndig fโˆšยบr das Sicherheitswesen, die Staatsgrenzen und die Organisation des Dienstbetriebs der Bundespolizei. Personenstandsan

GNR - Guarda Nacional Republicana

A Guarda Nacional Republicana โˆšยฉ uma forโˆšรŸa de seguranโˆšรŸa de natureza militar, que tem por missโˆšยฃo, no โˆšยขmbito dos sistemas nacionais de seguranโˆšรŸa e proteโˆšรŸโˆšยฃo, assegurar a legalidade democrโˆšยฐtica, garantir a seguranโˆšรŸa interna e os direitos dos cidadโˆšยฃos, bem como colaborar na execuโˆšรŸโˆšยฃo da polโˆšโ‰ t

TรœV Rheinland Group

Neutral, independent third party For more than 150 years, TรœV Rheinland has stood for ensuring quality, safety, and efficiency in conjunction with people, the environment, and technology. As a neutral, independent third party, we test, accompany, develop, promote and certify products, plants, proc

Pakistan Red Crescent Society (PRCS)

To be the leading humanitarian organization of Pakistan, which is dynamic, self-reliant and committed to preventing and alleviating human sufferings at the national and international level, while acting in compliance with fundamental principles and humanitarian values of the Red Cross and Red Cresce

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HSA CyberSecurity History Information

How many cyber incidents has HSA faced?

Total Incidents: According to Rankiteo, HSA has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at HSA?

Incident Types: The types of cybersecurity incidents that have occurred incident Data Leak.

How does HSA detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Verified no sensitive medical or contact information was contained in the database.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: HSA Blood Donor Data Breach

Description: The personal information of more than 800,000 people who have donated or registered to donate blood in Singapore since 1986 was improperly put online by the Health Sciences Authority (HSA).

Type: Data Breach

Attack Vector: Improper Data Exposure

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach HEA15589323

Data Compromised: Personal Information

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information.

Which entities were affected by each incident?

Incident : Data Breach HEA15589323

Entity Type: Government Agency

Industry: Healthcare

Location: Singapore

Customers Affected: 800,000

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach HEA15589323

Containment Measures: Verified no sensitive medical or contact information was contained in the database

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach HEA15589323

Type of Data Compromised: Personal Information

Number of Records Exposed: 800,000

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Verified no sensitive medical or contact information was contained in the database.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was Personal Information.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Verified no sensitive medical or contact information was contained in the database.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Information.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 800.0K.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge