Company Details
i-work-for-sa
19,039
31,951
92
sa.gov.au
0
I W_9807317
In-progress


I WORK FOR SA Vendor Cyber Rating & Cyber Score
sa.gov.auThe OFFICIAL careers page for the South Australian Government. The South Australian Public Sector is the State's largest workforce. We are an employer of choice that reflects the diverse community we serve. Our people are from a range of backgrounds and vocations, from entry level, mid-career and leadership professionals as well as graduates, apprentices and trainees. As a public sector employee, you can be proud that the work you do supports our community and our State's prosperity. For a career with more opportunity, flexibility and purpose, visit IWORKFOR.SA.gov.au
Company Details
i-work-for-sa
19,039
31,951
92
sa.gov.au
0
I W_9807317
In-progress
Between 750 and 799

WS Global Score (TPRM)XXXX

Description: Patients in South Australia affected by Personify Care's third-party platform data breach. The exposed data contained the health information of 121 patients on “supervised medication protocols”. 12,624 patients who were invited to use the platform were also listed, along with their names and phone numbers. An "unauthorised third party" was able to erase a folder containing patient papers that had been submitted to an internet platform, according to the state administration, due to "unintentional human error" on the part of the patient portal Personify Care.


No incidents recorded for I WORK FOR SA in 2026.
No incidents recorded for I WORK FOR SA in 2026.
No incidents recorded for I WORK FOR SA in 2026.
WS cyber incidents detection timeline including parent company and subsidiaries

The OFFICIAL careers page for the South Australian Government. The South Australian Public Sector is the State's largest workforce. We are an employer of choice that reflects the diverse community we serve. Our people are from a range of backgrounds and vocations, from entry level, mid-career and leadership professionals as well as graduates, apprentices and trainees. As a public sector employee, you can be proud that the work you do supports our community and our State's prosperity. For a career with more opportunity, flexibility and purpose, visit IWORKFOR.SA.gov.au


El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s

Ontario Government | Gouvernement de l’Ontario The Ontario Government works to serve the public interest and uphold the public trust by providing Ministers with objective advice and expert guidance. The Ontario Public Service carries out the decisions and policies of the elected government with int

Rijkswaterstaat is de uitvoeringsorganisatie van het Ministerie van Infrastructuur en Waterstaat. We beheren en ontwikkelen de rijkswegen, -vaarwegen en –wateren en zetten in op een duurzame leefomgeving. Samen met andere organisaties werken we aan een land dat beschermd is tegen overstromingen. Wa
Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above

Region Västra Götaland is governed by democratically elected politicians and with just over 50,000 employees is one of Sweden’s biggest employers. It is tasked with offering good healthcare and dental care and providing the prerequisites for good public health, a rich cultural life, a good enviro

MISIÓN/PROPÓSITO: La SEP tiene como propósito esencial crear condiciones que permitan asegurar el acceso de todas las mexicanas y mexicanos a una educación de calidad, en el nivel y modalidad que la requieran y en el lugar donde la demanden. VISIÓN: En el año 2025, México cuenta con un sistema

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is

#MeTeemmeHelsingin Helsingin kaupunki on Suomen suurin työnantaja, jonka palveluksessa on lähes 39 000 ammattilaista ja asiantuntijaa. Helsingin kaupunki tarjoaa henkilöstölle monipuolisia, mielenkiintoisia ja yhteiskunnallisesti merkittäviä työtehtäviä, hyvät mahdollisuudet kehittymiseen, ammatti
.png)
On 3 - 4 February 2026, African and European representatives and experts from governments, international organisations, academia,...
Virtual assistants are one of the most in-demand jobs in the Philippines. They perform administrative work, accounting, scheduling, and other necessary tasks.
Discover the top 30 highest-paying jobs in South Africa by monthly income. From neurosurgeons to IT executives, find out which careers offer...
MTN Group would like to inform stakeholders that it has experienced a cybersecurity incident that resulted in unauthorised access to personal information of...
A DOGE staffer working as a 'senior advisor' in the government's cybersecurity agency once provided tech support to a cybercrime ring.
Lee Enterprises said a cybersecurity attack that began disrupting its newspaper operations in Virginia and elsewhere more than a month ago has been “contained.”
Microsoft South Africa announced the launch of its AI skilling initiative to empower 1 million South Africans with in-demand digital skills...
Explore how to become a cybersecurity analyst in South Africa, including education, skills, salary expectations, and career growth insights.
The owners of eSentire are exploring options including a potential sale that could value the cybersecurity company at about $1 billion,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of I WORK FOR SA is http://iworkfor.sa.gov.au.
According to Rankiteo, I WORK FOR SA’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.
According to Rankiteo, I WORK FOR SA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, I WORK FOR SA has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, I WORK FOR SA is not certified under SOC 2 Type 1.
According to Rankiteo, I WORK FOR SA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, I WORK FOR SA is not listed as GDPR compliant.
According to Rankiteo, I WORK FOR SA does not currently maintain PCI DSS compliance.
According to Rankiteo, I WORK FOR SA is not compliant with HIPAA regulations.
According to Rankiteo,I WORK FOR SA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
I WORK FOR SA operates primarily in the Government Administration industry.
I WORK FOR SA employs approximately 19,039 people worldwide.
I WORK FOR SA presently has no subsidiaries across any sectors.
I WORK FOR SA’s official LinkedIn profile has approximately 31,951 followers.
I WORK FOR SA is classified under the NAICS code 92, which corresponds to Public Administration.
No, I WORK FOR SA does not have a profile on Crunchbase.
Yes, I WORK FOR SA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/i-work-for-sa.
As of April 02, 2026, Rankiteo reports that I WORK FOR SA has experienced 1 cybersecurity incidents.
I WORK FOR SA has an estimated 12,425 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Personify Care Data Breach
Description: Patients in South Australia affected by Personify Care's third-party platform data breach. The exposed data contained the health information of 121 patients on 'supervised medication protocols'. 12,624 patients who were invited to use the platform were also listed, along with their names and phone numbers. An 'unauthorised third party' was able to erase a folder containing patient papers that had been submitted to an internet platform, according to the state administration, due to 'unintentional human error' on the part of the patient portal Personify Care.
Type: Data Breach
Attack Vector: Unintentional Human Error
Threat Actor: Unauthorized Third Party
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Health information, Names, Phone numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Health Information, Names, Phone Numbers and .

Entity Name: Personify Care
Entity Type: Healthcare
Industry: Healthcare
Location: South Australia
Customers Affected: 121, 12624

Type of Data Compromised: Health information, Names, Phone numbers
Number of Records Exposed: 12745
Sensitivity of Data: High

Root Causes: Unintentional Human Error
Last Attacking Group: The attacking group in the last incident was an Unauthorized Third Party.
Most Significant Data Compromised: The most significant data compromised in an incident were Health Information, Names, Phone Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Health Information and Phone Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 172.0.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.