
Isentia Company Cyber Security Posture
isentia.comWe are the Asia-Pacific region's leading media intelligence company; empowering clients to understand their brand and reputation since 1982. Our clients are diverse, ranging from globally renowned brands right through to government bodies and not for profit organisations. Isentia was acquired by UK based company Access Intelligence on September 1st, 2021 and the future looks bright as we join forces to become a global leader in media intelligence. Our mission is to create actionable insight from complex communication channels. With powerful technology and clever people, we deliver whatโs relevant when our clients need it, driving decisions and opening possibilities.
Isentia Company Details
isentia
910 employees
23501
541
Public Relations and Communications Services
isentia.com
Scan still pending
ISE_3150390
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Isentia Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Isentia Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Isentia | Cyber Attack | 60 | 2 | 10/2020 | ISE218523 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: Isentia, a company that monitors the media, has experienced a "cyber security incident" that is having an impact on its main information and insights offering. In a financial filing, the business stated that it is quickly looking into the issue, which is impairing services on its SaaS platform Mediaportal. To determine the severity of the event and its effects on its systems, Isentia is collaborating closely with eminent outside cyber security experts. The company stated that while restoring full service as soon as possible is their first priority, they have put procedures in place to serve our clients in the interim. | |||||||
Isentia | Ransomware | 60 | 1 | 11/2020 | ISE152413222 | Link | |
Rankiteo Explanation : Attack without any consequencesDescription: Sydney-based Isentia was hit by a ransomware attack in November 2020. The Isentia immediately took preventive steps to contain the incident and protect its network from future attacks. |
Isentia Company Subsidiaries

We are the Asia-Pacific region's leading media intelligence company; empowering clients to understand their brand and reputation since 1982. Our clients are diverse, ranging from globally renowned brands right through to government bodies and not for profit organisations. Isentia was acquired by UK based company Access Intelligence on September 1st, 2021 and the future looks bright as we join forces to become a global leader in media intelligence. Our mission is to create actionable insight from complex communication channels. With powerful technology and clever people, we deliver whatโs relevant when our clients need it, driving decisions and opening possibilities.
Access Data Using Our API

Get company history
.png)
Isentia Cyber Security News
How media and public perceptions around cybersecurity are evolving in Southeast Asia
In Southeast Asia, conversations around cybersecurity have gained significant traction over the past two years, driven by rising awarenessย ...
Cyberattack strikes media-monitoring company used by Australian government
The downed media portal not only means customers have been unable to access their media data, but staff too have been shut out of the portal.
Isentia ransomware attack expected to cost at least $7 million
Isentia described the incident as โsignificant as operations were severely compromisedโ, with a hit of between $7 million and $8.5 millionย ...
Isentia apologises for cyber attack, confirms โsignificantโ impact on revenues
Isentia has apologised to clients following last month's cyber security attack and said all key services, including its Mediaportal platformย ...

Isentia Similar Companies

International Mission of Mercy (IMM)
International Mission of Mercy (IMM) was founded in 1991 by Satish Mehtani, a veteran of disaster relief missions in Kuwait, Japan and at the World Trade Center following September 11, 2001. IMM is a certified 501(c)(3) nonprofit organization whose goals are to serve people of all cultures fo

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Isentia CyberSecurity History Information
How many cyber incidents has Isentia faced?
Total Incidents: According to Rankiteo, Isentia has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at Isentia?
Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Cyber Attack.
How does Isentia detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Collaborating with eminent outside cyber security experts and recovery measures with Put procedures in place to serve clients in the interim and communication strategy with Public disclosure in a financial filing and containment measures with Preventive steps to contain the incident and remediation measures with Protective measures to safeguard the network from future attacks.
Incident Details
Can you provide details on each incident?

Incident : Cyber Security Incident
Title: Cyber Security Incident at Isentia
Description: Isentia, a company that monitors the media, has experienced a cyber security incident affecting its main information and insights offering, specifically impairing services on its SaaS platform Mediaportal.
Type: Cyber Security Incident

Incident : Ransomware Attack
Title: Isentia Ransomware Attack
Description: Sydney-based Isentia was hit by a ransomware attack in November 2020. Isentia immediately took preventive steps to contain the incident and protect its network from future attacks.
Date Detected: November 2020
Type: Ransomware Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Impact of the Incidents
What was the impact of each incident?

Incident : Cyber Security Incident ISE218523
Systems Affected: SaaS platform Mediaportal
Which entities were affected by each incident?

Incident : Ransomware Attack ISE152413222
Entity Type: Company
Industry: Media Intelligence
Location: Sydney
Response to the Incidents
What measures were taken in response to each incident?

Incident : Cyber Security Incident ISE218523
Third Party Assistance: Collaborating with eminent outside cyber security experts
Recovery Measures: Put procedures in place to serve clients in the interim
Communication Strategy: Public disclosure in a financial filing

Incident : Ransomware Attack ISE152413222
Containment Measures: Preventive steps to contain the incident
Remediation Measures: Protective measures to safeguard the network from future attacks
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Collaborating with eminent outside cyber security experts.
Data Breach Information
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Protective measures to safeguard the network from future attacks.
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Preventive steps to contain the incident.
Ransomware Information
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Put procedures in place to serve clients in the interim.
References
Where can I find more information about each incident?

Incident : Cyber Security Incident ISE218523
Source: Financial filing
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Financial filing.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Cyber Security Incident ISE218523
Investigation Status: Quickly looking into the issue
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Public disclosure in a financial filing.
Stakeholder and Customer Advisories
Were there any advisories issued to stakeholders or customers for each incident?

Incident : Cyber Security Incident ISE218523
Customer Advisories: Informed customers about the incident and put procedures in place to serve them in the interim
What advisories does the company provide to stakeholders and customers following an incident?
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Informed customers about the incident and put procedures in place to serve them in the interim.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Collaborating with eminent outside cyber security experts.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on November 2020.
Impact of the Incidents
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was SaaS platform Mediaportal.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Collaborating with eminent outside cyber security experts.
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Preventive steps to contain the incident.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is Financial filing.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Quickly looking into the issue.
Stakeholder and Customer Advisories
What was the most recent customer advisory issued?
Most Recent Customer Advisory: The most recent customer advisory issued was was an Informed customers about the incident and put procedures in place to serve them in the interim.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
