
The Janssen Pharmaceutical Companies of Johnson & Johnson Company Cyber Security Posture
janssen.comAt Janssen, we never stop working toward a future where disease is a thing of the past. Weโre the Pharmaceutical Companies of Johnson & Johnson, and you can count on us to keep working tirelessly to make that future a reality for patients everywhere, by fighting sickness with science, improving access with ingenuity, and healing hopelessness with heart. We focus on areas of medicine where we can make the biggest difference: Cardiovascular & Metabolism, Immunology, Infectious Diseases & Vaccines, Neuroscience, Oncology, and Pulmonary Arterial Hypertension. Visit us: www.janssen.com Follow us: @JanssenGlobal on Twitter and Instagram Watch our videos on our YouTube channel: http://bit.ly/1LY2xQ5
JPCJ&J Company Details
janssen-pharmaceutical-companies-of-johnson-and-johnson
19034 employees
1046786.0
325
Pharmaceutical Manufacturing
janssen.com
Scan still pending
THE_2598635
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

The Janssen Pharmaceutical Companies of Johnson & Johnson Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
The Janssen Pharmaceutical Companies of Johnson & Johnson Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Johnson & Johnson | Breach | 85 | 4 | 01/2018 | JOH202818522 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The home addresses of hundreds of Irish people had been published online in a data breach by a pharmaceutical company. The error left people vulnerable to hackers as the company also shared email addresses that may be linked to other online accounts. | |||||||
Johnson & Johnson | Breach | 50 | 2 | 7/2025 | JOH333071125 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: Johnson & Johnson, along with other companies like CVS Health and Walgreens, has been involved in opioid settlements due to their role in the addiction crisis. The article highlights concerns about the misuse of settlement funds, which were intended to address the opioid crisis but are being diverted to other purposes. This misuse includes spending on unrelated projects like road repairs and jail body scanners, rather than helping those affected by addiction. The misallocation of these funds has led to widespread concern and advocacy for better oversight. |
The Janssen Pharmaceutical Companies of Johnson & Johnson Company Subsidiaries

At Janssen, we never stop working toward a future where disease is a thing of the past. Weโre the Pharmaceutical Companies of Johnson & Johnson, and you can count on us to keep working tirelessly to make that future a reality for patients everywhere, by fighting sickness with science, improving access with ingenuity, and healing hopelessness with heart. We focus on areas of medicine where we can make the biggest difference: Cardiovascular & Metabolism, Immunology, Infectious Diseases & Vaccines, Neuroscience, Oncology, and Pulmonary Arterial Hypertension. Visit us: www.janssen.com Follow us: @JanssenGlobal on Twitter and Instagram Watch our videos on our YouTube channel: http://bit.ly/1LY2xQ5
Access Data Using Our API

Get company history
.png)
JPCJ&J Cyber Security News
Johnson & Johnson appoints CIO to lead business technology strategy
Johnson & Johnson appointed Chris Della Rocca as its SVP, CIO of corporate business technology, the executive said Monday in a LinkedIn post.
J&J's patient assistance program suffers data breach, IBM says
A technical flaw has resulted in โunauthorized accessโ to personal information at Johnson & Johnson's Janssen CarePath patient assistanceย ...
IBM, Johnson & Johnson Hit With Second Health Data Breach Suit
IBM Corp. and Johnson & Johnson Health Care Systems Inc. face a Florida man's proposed class action over an August data breach.
Data breach at pharma partner Cencora puts sensitive patient information at risk
A data breach at drug distributor Cencora has left sensitive information vulnerable, with patients on medicines from a dozen drugmakersย ...
4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain
Faking data is a common component of cyberattacks and counterfeiting, said Greatwood. โThe attacker wants the victim to believe everything isย ...

JPCJ&J Similar Companies

Eurofarma
Since its establishment in 1972, Eurofarma has been operating in the health industry, producing and marketing products and services to improve people's quality of life. Focused on generating shared value, it operates in the areas of Prescription, Nos-Prescription, Generics, Hospital and Oncology. It

UCB
UCB โ Inspired by patients. Driven by science. At UCB, we put our heart, soul and skills into making a difference for people living with severe diseases. We look to transform patientsโ lives by pushing the boundaries of what is possible. With us, our talents makes the most of who they are, unlocking

PT Kalbe Farma, Tbk
Established in 1966, PT Kalbe Farma Tbk. (โthe Companyโ or โKalbeโ) has gone a long way from its humble beginnings as a garage-operated pharmaceutical business in North Jakarta. It has expanded by strategic acquisitions of pharmaceutical companies, building a leading brand positioning and reaching t

Celesio AG
On 12 September 2017, Celesio AG has officially announced its renaming to McKesson Europe AG, based on the shareholdersโ decision at the Annual General Meeting 2017. Documents of Celesio AG remain documents of McKesson Europe AG. More information can be found in the press release"Renaming: Celesio

Glenmark Pharmaceuticals
Glenmark Pharmaceuticals Limited is a research-led, global organization committed to enriching lives. Innovation is deeply embedded in Glenmarkโs culture; it is how we differentiate ourselves in our key markets and create greater value for our stakeholders. In our journey of innovation over the pa

China Pharmaceutical University
China Pharmaceutical University (CPU), situated in the historical and cultural city of Nanjing, is one of the โ211 projectโ key universities affiliated to the Ministry of Education of China. Over the past 80 years since its establishment, the University has been sticking to the motto of โDedicated t

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
JPCJ&J CyberSecurity History Information
How many cyber incidents has JPCJ&J faced?
Total Incidents: According to Rankiteo, JPCJ&J has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at JPCJ&J?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach.
How does JPCJ&J detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Opioid Policy Institute, Popular Democracy.
Incident Details
Can you provide details on each incident?

Incident : Financial Misuse
Title: Misuse of Opioid Settlement Funds
Description: State attorneys general won billions of dollars in opioid settlements from drug companies accused of fueling the addiction crisis. Concerns have arisen that the settlement funds are not being used for their intended purposes. Advocacy groups are proposing a crowdsourced database to identify potential examples of misuse and prompt attorneys general to investigate.
Type: Financial Misuse
Motivation: Financial Gain

Incident : Data Breach
Title: Pharmaceutical Company Data Breach
Description: The home addresses of hundreds of Irish people had been published online in a data breach by a pharmaceutical company. The error left people vulnerable to hackers as the company also shared email addresses that may be linked to other online accounts.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Financial Misuse JOH333071125
Customer Complaints: ['Families affected by the overdose crisis', 'Recovery and harm reduction advocates', 'Policy experts', 'Researchers following the cash']

Incident : Data Breach JOH202818522
Data Compromised: Home addresses, Email addresses
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Home addresses and Email addresses.
Which entities were affected by each incident?

Incident : Financial Misuse JOH333071125
Entity Type: Government
Industry: Public Sector
Location: Multiple States

Incident : Data Breach JOH202818522
Entity Type: Pharmaceutical Company
Industry: Pharmaceutical
Location: Ireland
Customers Affected: Hundreds
Response to the Incidents
What measures were taken in response to each incident?

Incident : Financial Misuse JOH333071125
Third Party Assistance: Opioid Policy Institute, Popular Democracy
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Opioid Policy Institute, Popular Democracy.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach JOH202818522
Type of Data Compromised: Home addresses, Email addresses
Number of Records Exposed: Hundreds
Sensitivity of Data: High
Personally Identifiable Information: Yes
Lessons Learned and Recommendations
What recommendations were made to prevent future incidents?

Incident : Financial Misuse JOH333071125
Recommendations: Implement a crowdsourced database to identify potential misuse of opioid settlement funds, Encourage attorneys general to take an active oversight role
What recommendations has the company implemented to improve cybersecurity?
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement a crowdsourced database to identify potential misuse of opioid settlement funds, Encourage attorneys general to take an active oversight role.
References
Where can I find more information about each incident?

Incident : Financial Misuse JOH333071125
Source: KFF Health News
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: KFF Health News.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Opioid Policy Institute, Popular Democracy.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Home addresses and Email addresses.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Opioid Policy Institute, Popular Democracy.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Home addresses and Email addresses.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Lessons Learned and Recommendations
What was the most significant recommendation implemented to improve cybersecurity?
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement a crowdsourced database to identify potential misuse of opioid settlement funds, Encourage attorneys general to take an active oversight role.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is KFF Health News.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
