Isentia Company Cyber Security Posture

isentia.com

We are the Asia-Pacific region's leading media intelligence company; empowering clients to understand their brand and reputation since 1982. Our clients are diverse, ranging from globally renowned brands right through to government bodies and not for profit organisations. Isentia was acquired by UK based company Access Intelligence on September 1st, 2021 and the future looks bright as we join forces to become a global leader in media intelligence. Our mission is to create actionable insight from complex communication channels. With powerful technology and clever people, we deliver whatโ€™s relevant when our clients need it, driving decisions and opening possibilities.

Isentia Company Details

Linkedin ID:

isentia

Employees number:

910 employees

Number of followers:

23501

NAICS:

541

Industry Type:

Public Relations and Communications Services

Homepage:

isentia.com

IP Addresses:

Scan still pending

Company ID:

ISE_3150390

Scan Status:

In-progress

AI scoreIsentia Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreIsentia Global Score
blurone
Ailogo

Isentia Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Isentia Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
IsentiaCyber Attack60210/2020ISE218523Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Isentia, a company that monitors the media, has experienced a "cyber security incident" that is having an impact on its main information and insights offering. In a financial filing, the business stated that it is quickly looking into the issue, which is impairing services on its SaaS platform Mediaportal. To determine the severity of the event and its effects on its systems, Isentia is collaborating closely with eminent outside cyber security experts. The company stated that while restoring full service as soon as possible is their first priority, they have put procedures in place to serve our clients in the interim.

IsentiaRansomware60111/2020ISE152413222Link
Rankiteo Explanation :
Attack without any consequences

Description: Sydney-based Isentia was hit by a ransomware attack in November 2020. The Isentia immediately took preventive steps to contain the incident and protect its network from future attacks.

Isentia Company Subsidiaries

SubsidiaryImage

We are the Asia-Pacific region's leading media intelligence company; empowering clients to understand their brand and reputation since 1982. Our clients are diverse, ranging from globally renowned brands right through to government bodies and not for profit organisations. Isentia was acquired by UK based company Access Intelligence on September 1st, 2021 and the future looks bright as we join forces to become a global leader in media intelligence. Our mission is to create actionable insight from complex communication channels. With powerful technology and clever people, we deliver whatโ€™s relevant when our clients need it, driving decisions and opening possibilities.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=isentia' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Isentia Cyber Security News

2025-01-06T08:00:00.000Z
How media and public perceptions around cybersecurity are evolving in Southeast Asia

In Southeast Asia, conversations around cybersecurity have gained significant traction over the past two years, driven by rising awarenessย ...

2020-10-27T07:00:00.000Z
Cyberattack strikes media-monitoring company used by Australian government

The downed media portal not only means customers have been unable to access their media data, but staff too have been shut out of the portal.

2020-11-03T08:00:00.000Z
Isentia ransomware attack expected to cost at least $7 million

Isentia described the incident as โ€œsignificant as operations were severely compromisedโ€, with a hit of between $7 million and $8.5 millionย ...

2020-11-24T08:00:00.000Z
Isentia apologises for cyber attack, confirms โ€˜significantโ€™ impact on revenues

Isentia has apologised to clients following last month's cyber security attack and said all key services, including its Mediaportal platformย ...

similarCompanies

Isentia Similar Companies

International Mission of Mercy (IMM)

International Mission of Mercy (IMM) was founded in 1991 by Satish Mehtani, a veteran of disaster relief missions in Kuwait, Japan and at the World Trade Center following September 11, 2001. IMM is a certified 501(c)(3) nonprofit organization whose goals are to serve people of all cultures fo

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Isentia CyberSecurity History Information

How many cyber incidents has Isentia faced?

Total Incidents: According to Rankiteo, Isentia has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at Isentia?

Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Cyber Attack.

How does Isentia detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Collaborating with eminent outside cyber security experts and recovery measures with Put procedures in place to serve clients in the interim and communication strategy with Public disclosure in a financial filing and containment measures with Preventive steps to contain the incident and remediation measures with Protective measures to safeguard the network from future attacks.

Incident Details

Can you provide details on each incident?

Incident : Cyber Security Incident

Title: Cyber Security Incident at Isentia

Description: Isentia, a company that monitors the media, has experienced a cyber security incident affecting its main information and insights offering, specifically impairing services on its SaaS platform Mediaportal.

Type: Cyber Security Incident

Incident : Ransomware Attack

Title: Isentia Ransomware Attack

Description: Sydney-based Isentia was hit by a ransomware attack in November 2020. Isentia immediately took preventive steps to contain the incident and protect its network from future attacks.

Date Detected: November 2020

Type: Ransomware Attack

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident?

Incident : Cyber Security Incident ISE218523

Systems Affected: SaaS platform Mediaportal

Which entities were affected by each incident?

Incident : Cyber Security Incident ISE218523

Entity Type: Company

Industry: Media Monitoring

Incident : Ransomware Attack ISE152413222

Entity Type: Company

Industry: Media Intelligence

Location: Sydney

Response to the Incidents

What measures were taken in response to each incident?

Incident : Cyber Security Incident ISE218523

Third Party Assistance: Collaborating with eminent outside cyber security experts

Recovery Measures: Put procedures in place to serve clients in the interim

Communication Strategy: Public disclosure in a financial filing

Incident : Ransomware Attack ISE152413222

Containment Measures: Preventive steps to contain the incident

Remediation Measures: Protective measures to safeguard the network from future attacks

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Collaborating with eminent outside cyber security experts.

Data Breach Information

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Protective measures to safeguard the network from future attacks.

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Preventive steps to contain the incident.

Ransomware Information

How does the company recover data encrypted by ransomware?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Put procedures in place to serve clients in the interim.

References

Where can I find more information about each incident?

Incident : Cyber Security Incident ISE218523

Source: Financial filing

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Financial filing.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Cyber Security Incident ISE218523

Investigation Status: Quickly looking into the issue

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Public disclosure in a financial filing.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Cyber Security Incident ISE218523

Customer Advisories: Informed customers about the incident and put procedures in place to serve them in the interim

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Informed customers about the incident and put procedures in place to serve them in the interim.

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Collaborating with eminent outside cyber security experts.

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on November 2020.

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was SaaS platform Mediaportal.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Collaborating with eminent outside cyber security experts.

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Preventive steps to contain the incident.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Financial filing.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Quickly looking into the issue.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an Informed customers about the incident and put procedures in place to serve them in the interim.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge