Comparison Overview

Hospital Sisters Health System

VS

Sanford Health

Hospital Sisters Health System

4936 LaVerna Road, Springfield, 62707, US
Last Update: 2026-03-29
Between 750 and 799

Since 1875, the Hospital Sisters of St. Francis have been caring for patients in Illinois, Wisconsin and other locations in the United States and across the world. Today, Hospital Sisters Health System (HSHS) is a multi-institutional health care system that cares for patients in 14 communities in Illinois and Wisconsin. With 15 hospitals, scores of community-based health centers and clinics, nearly 2,300 physician partners, and more than 14,600 colleagues, HSHS is committed to its mission “to reveal and embody Christ’s healing love for all people through our high quality Franciscan health care ministry.” HSHS continues to advance its mission through its care integration strategy by working closely with physician partners in Illinois and Wisconsin to deliver high quality, patient-centered care. Together, we strive to ensure each patient who enters our system has seamless access to health and wellness programs, primary and specialty care, and acute and post-acute care. Through their commitment to our care integration strategy, HSHS physician partners coordinate closely with our hospital and clinic colleagues to provide our patients with holistic care that meets their individual needs. By leveraging the latest technology, emphasizing the importance of relationships, and living its values, HSHS is making a positive difference in the lives of the patients and families it is privileged to serve.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 11,604
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Sanford Health

-, Sioux Falls, US
Last Update: 2026-03-29
Between 700 and 749

Sanford Health is the largest rural health system in the U.S. Our organization is dedicated to transforming the health care experience and providing access to world-class health care in America’s heartland. Headquartered in Sioux Falls, South Dakota, we serve more than one million patients and 220,000 health plan members across 250,000 square miles. Our integrated health system has 47 medical centers, 2,800 physicians and advanced practice providers, 170 clinical investigators and research scientists, more than 200 Good Samaritan Society senior care locations, and world clinics in eight countries around the globe. Learn more about our commitment to shaping the future of rural health care at sanfordhealth.org or Sanford Health News.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 15,889
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/hospital-sisters-health-system.jpeg
Hospital Sisters Health System
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/sanford-health.jpeg
Sanford Health
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Hospital Sisters Health System
100%
Compliance Rate
0/4 Standards Verified
Sanford Health
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Hospital Sisters Health System in 2026.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Sanford Health in 2026.

Incident History — Hospital Sisters Health System (X = Date, Y = Severity)

Hospital Sisters Health System cyber incidents detection timeline including parent company and subsidiaries

Incident History — Sanford Health (X = Date, Y = Severity)

Sanford Health cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/hospital-sisters-health-system.jpeg
Hospital Sisters Health System
Incidents

Date Detected: 8/2023
Type:Cyber Attack
Attack Vector: Network Intrusion (Unauthorized Access)
Blog: Blog
https://images.rankiteo.com/companyimages/sanford-health.jpeg
Sanford Health
Incidents

Date Detected: 05/2023
Type:Breach
Blog: Blog

FAQ

Hospital Sisters Health System company demonstrates a stronger AI Cybersecurity Score compared to Sanford Health company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Hospital Sisters Health System and Sanford Health have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Sanford Health company and Hospital Sisters Health System company have not reported any cyber incidents.

Neither Sanford Health company nor Hospital Sisters Health System company has reported experiencing a ransomware attack publicly.

Sanford Health company has disclosed at least one data breach, while Hospital Sisters Health System company has not reported such incidents publicly.

Hospital Sisters Health System company has reported targeted cyberattacks, while Sanford Health company has not reported such incidents publicly.

Neither Hospital Sisters Health System company nor Sanford Health company has reported experiencing or disclosing vulnerabilities publicly.

Neither Hospital Sisters Health System nor Sanford Health holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Hospital Sisters Health System company nor Sanford Health company has publicly disclosed detailed information about the number of their subsidiaries.

Sanford Health company employs more people globally than Hospital Sisters Health System company, reflecting its scale as a Hospitals and Health Care.

Neither Hospital Sisters Health System nor Sanford Health holds SOC 2 Type 1 certification.

Neither Hospital Sisters Health System nor Sanford Health holds SOC 2 Type 2 certification.

Neither Hospital Sisters Health System nor Sanford Health holds ISO 27001 certification.

Neither Hospital Sisters Health System nor Sanford Health holds PCI DSS certification.

Neither Hospital Sisters Health System nor Sanford Health holds HIPAA certification.

Neither Hospital Sisters Health System nor Sanford Health holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X