
Horizon Actuarial Services Company Cyber Security Posture
horizonactuarial.comWeโre a leading actuarial consulting firm, providing solutions to over 150 multiemployer benefit plans across a wide range of industries.
HAS Company Details
horizon-actuarial-services
68 employees
320.0
523
Investment Management
horizonactuarial.com
Scan still pending
HOR_1706288
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Horizon Actuarial Services Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Horizon Actuarial Services Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Horizon Actuarial Services | Breach | 85 | 4 | 11/2021 | HOR153630422 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The two computer servers of Horizon Actuarial were accessed without authorization for a limited period. The hackers stole the copies of personal data from its computer server including include names, dates of birth, Social Security numbers and health plan information. Horizon immediately launched the investigation and secured its servers. |
Horizon Actuarial Services Company Subsidiaries

Weโre a leading actuarial consulting firm, providing solutions to over 150 multiemployer benefit plans across a wide range of industries.
Access Data Using Our API

Get company history
.png)
HAS Cyber Security News
Settlement Struck in Consulting Actuarial Firm Data Hack
During this time, Plaintiff and Class Members were unaware that their sensitive personal identifying information had been compromised, and thatย ...
Plaintiffs Request Court Approval of Settlement in ERISA Class Action Cyberattack Lawsuit
A recent ERISA class action lawsuit highlights the importance of regular audits of data security practices to mitigate cybersecurity risksย ...
Plaintiffs Request Judge Approve Settlement in ERISA Data Breach Lawsuit
Attorneys for the plaintiffs in a case about cybersecurity liability for participant data asked a Georgia federal judge for final approvalย ...
Horizon Actuarial data breach $8.73M class action settlement
According to the data breach class action lawsuit, Horizon Actuarial Services failed to take reasonable cybersecurity measures that could have prevented aย ...
Actuary Lawsuit Highlights Data Breach Risks
A financial services firm is accused of failing to properly secure and safeguard personally identifiable information provided by and belongingย ...
Major League Baseball Playersโ Personal Data Stolen
Sarah Coble. News Writer. Personal data belonging to American Major League Baseball Players and their family members have been stolen during aย ...
Everything you need to know about Horizon data breach settlement
What benefits are available in the Horizon settlement? Eligible class members can receive compensation for documented out-of-pocket losses, timeย ...
Cyber threat outlook for the sports industry
May 15, 2024 - The professional sports industry represents the unique intersection of numerous motivating factors for cyber criminals.

HAS Similar Companies

Ezdan Holding Group
The strides of Ezdan Holding Group over the last five decades have reflected the image of the State of Qatar in its development as the company was transformed from an individual to a shareholding company. The roots of Ezdan Holding Group date back to 1960, when it was founded as a private company un

Tibiyo Taka Ngwane
Tibiyo Taka Ngwane invests in businesses that support the social, cultural and economic development of the Emaswati (the people of Eswatini). Through its diverse business portfolio - covering agriculture, agro-processing, manufacturing, services, tourism and hospitality, mining, property and media -

Entekhab Group
Entekhab Group is one of the largest Iranian international holdings which seeks to impact industry and economy of Iran and the world. The impact which more than anything, is derived from updated and localized knowledge and technology which has so far been implemented in most Iranian economic fields.

Pudur Corporation
On any given day, Sixty Million people use Pudur products and services to get more out of life. With more than twenty business verticals focused on innovation,technology, health, wellbeing, environment, investments, natural resources, trading, energy, agro, real estate, telecom, defense, banking

Loews Corporation
Loews Corporation is a diversified company with a mix of public and private subsidiaries: CNA Financial Corporation (NYSE: CNA), Boardwalk Pipelines, Loews Hotels & Co. and Altium Packaging. For more information please visit www.loews.com. At Loews, we donโt show movies, at least not anymore, and

Ackermans & van Haaren
Ackermans & van Haaren is a diversified group active in 4 core sectors: Marine Engineering & Contracting (DEME, one of the largest dredging companies in the world - CFE, a construction group with headquarters in Belgium), Private Banking (Delen Private Bank, one of the largest independent private as

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
HAS CyberSecurity History Information
How many cyber incidents has HAS faced?
Total Incidents: According to Rankiteo, HAS has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at HAS?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does HAS detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Secured Servers.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Unauthorized Access to Horizon Actuarial Servers
Description: Two computer servers of Horizon Actuarial were accessed without authorization for a limited period. The hackers stole copies of personal data including names, dates of birth, Social Security numbers, and health plan information. Horizon immediately launched an investigation and secured its servers.
Type: Data Breach
Attack Vector: Unauthorized Access
Motivation: Data Theft
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach HOR153630422
Data Compromised: Names, Dates of Birth, Social Security Numbers, Health Plan Information
Systems Affected: Computer Servers
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach HOR153630422
Containment Measures: Secured Servers
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach HOR153630422
Type of Data Compromised: Personal Data
Sensitivity of Data: High
Data Exfiltration: True
Personally Identifiable Information: True
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Secured Servers.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Data Breach HOR153630422
Investigation Status: Launched
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Social Security Numbers and Health Plan Information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Computer Servers.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured Servers.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Dates of Birth, Social Security Numbers and Health Plan Information.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Launched.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
