Horizon Actuarial Services Company Cyber Security Posture

horizonactuarial.com

Weโ€™re a leading actuarial consulting firm, providing solutions to over 150 multiemployer benefit plans across a wide range of industries.

HAS Company Details

Linkedin ID:

horizon-actuarial-services

Employees number:

68 employees

Number of followers:

320.0

NAICS:

523

Industry Type:

Investment Management

Homepage:

horizonactuarial.com

IP Addresses:

Scan still pending

Company ID:

HOR_1706288

Scan Status:

In-progress

AI scoreHAS Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Horizon Actuarial Services Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Horizon Actuarial Services Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Horizon Actuarial ServicesBreach85411/2021HOR153630422Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The two computer servers of Horizon Actuarial were accessed without authorization for a limited period. The hackers stole the copies of personal data from its computer server including include names, dates of birth, Social Security numbers and health plan information. Horizon immediately launched the investigation and secured its servers.

Horizon Actuarial Services Company Subsidiaries

SubsidiaryImage

Weโ€™re a leading actuarial consulting firm, providing solutions to over 150 multiemployer benefit plans across a wide range of industries.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=horizon-actuarial-services' -H 'apikey: YOUR_API_KEY_HERE'
newsone

HAS Cyber Security News

2023-09-25T07:00:00.000Z
Settlement Struck in Consulting Actuarial Firm Data Hack

During this time, Plaintiff and Class Members were unaware that their sensitive personal identifying information had been compromised, and thatย ...

2024-04-01T07:00:00.000Z
Plaintiffs Request Court Approval of Settlement in ERISA Class Action Cyberattack Lawsuit

A recent ERISA class action lawsuit highlights the importance of regular audits of data security practices to mitigate cybersecurity risksย ...

2024-03-13T07:00:00.000Z
Plaintiffs Request Judge Approve Settlement in ERISA Data Breach Lawsuit

Attorneys for the plaintiffs in a case about cybersecurity liability for participant data asked a Georgia federal judge for final approvalย ...

2024-02-23T15:17:15.000Z
Horizon Actuarial data breach $8.73M class action settlement

According to the data breach class action lawsuit, Horizon Actuarial Services failed to take reasonable cybersecurity measures that could have prevented aย ...

2022-05-09T07:00:00.000Z
Actuary Lawsuit Highlights Data Breach Risks

A financial services firm is accused of failing to properly secure and safeguard personally identifiable information provided by and belongingย ...

2022-03-25T07:00:00.000Z
Major League Baseball Playersโ€™ Personal Data Stolen

Sarah Coble. News Writer. Personal data belonging to American Major League Baseball Players and their family members have been stolen during aย ...

2023-11-29T08:00:00.000Z
Everything you need to know about Horizon data breach settlement

What benefits are available in the Horizon settlement? Eligible class members can receive compensation for documented out-of-pocket losses, timeย ...

2024-05-15T07:00:00.000Z
Cyber threat outlook for the sports industry

May 15, 2024 - The professional sports industry represents the unique intersection of numerous motivating factors for cyber criminals.

similarCompanies

HAS Similar Companies

Ezdan Holding Group

The strides of Ezdan Holding Group over the last five decades have reflected the image of the State of Qatar in its development as the company was transformed from an individual to a shareholding company. The roots of Ezdan Holding Group date back to 1960, when it was founded as a private company un

Tibiyo Taka Ngwane

Tibiyo Taka Ngwane invests in businesses that support the social, cultural and economic development of the Emaswati (the people of Eswatini). Through its diverse business portfolio - covering agriculture, agro-processing, manufacturing, services, tourism and hospitality, mining, property and media -

Entekhab Group

Entekhab Group is one of the largest Iranian international holdings which seeks to impact industry and economy of Iran and the world. The impact which more than anything, is derived from updated and localized knowledge and technology which has so far been implemented in most Iranian economic fields.

Pudur Corporation

On any given day, Sixty Million people use Pudur products and services to get more out of life. With more than twenty business verticals focused on innovation,technology, health, wellbeing, environment, investments, natural resources, trading, energy, agro, real estate, telecom, defense, banking

Loews Corporation

Loews Corporation is a diversified company with a mix of public and private subsidiaries: CNA Financial Corporation (NYSE: CNA), Boardwalk Pipelines, Loews Hotels & Co. and Altium Packaging. For more information please visit www.loews.com. At Loews, we donโ€™t show movies, at least not anymore, and

Ackermans & van Haaren

Ackermans & van Haaren is a diversified group active in 4 core sectors: Marine Engineering & Contracting (DEME, one of the largest dredging companies in the world - CFE, a construction group with headquarters in Belgium), Private Banking (Delen Private Bank, one of the largest independent private as

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HAS CyberSecurity History Information

How many cyber incidents has HAS faced?

Total Incidents: According to Rankiteo, HAS has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at HAS?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does HAS detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Secured Servers.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Unauthorized Access to Horizon Actuarial Servers

Description: Two computer servers of Horizon Actuarial were accessed without authorization for a limited period. The hackers stole copies of personal data including names, dates of birth, Social Security numbers, and health plan information. Horizon immediately launched an investigation and secured its servers.

Type: Data Breach

Attack Vector: Unauthorized Access

Motivation: Data Theft

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach HOR153630422

Data Compromised: Names, Dates of Birth, Social Security Numbers, Health Plan Information

Systems Affected: Computer Servers

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data.

Which entities were affected by each incident?

Incident : Data Breach HOR153630422

Entity Type: Company

Industry: Actuarial Services

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach HOR153630422

Containment Measures: Secured Servers

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach HOR153630422

Type of Data Compromised: Personal Data

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Secured Servers.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach HOR153630422

Investigation Status: Launched

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Social Security Numbers and Health Plan Information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Computer Servers.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured Servers.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Dates of Birth, Social Security Numbers and Health Plan Information.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Launched.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge