
Jekyll Island Authority Company Cyber Security Posture
jekyllisland.comJekyll Island, Georgia is a beautiful island located on the coast of Georgia mid-point between Savannah and Jacksonville, FL. The Jekyll Island Authority is a self-supporting authority of the State of Georgia responsible for the overall management and stewardship of Jekyll Island. Obtaining its operating revenues from leases, fees, and island amenity operations, income is used to maintain, develop, beautify, and promote Jekyll Island as a public beach resort and a world-class vacation and meeting destination. Jekyll Island does not receive any tax revenues for its operation.
JIA Company Details
jekyll-island-authority
162 employees
1703.0
561
Travel Arrangements
jekyllisland.com
Scan still pending
JEK_1993708
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Jekyll Island Authority Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Jekyll Island Authority Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Jekyll Island Authority | Ransomware | 60 | 3 | 09/2020 | JEK121614222 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Jekyll Island Authority discovered that they were hit in a ransomware attack in September 2020. The third-party firm Coastal Computing spent over 340 hours handling the attack. Some of the company's internal information along with a few customers' personal information was compromised in the attack. The authority invested around $25,000 in security measures to secure their network after the attack. |
Jekyll Island Authority Company Subsidiaries

Jekyll Island, Georgia is a beautiful island located on the coast of Georgia mid-point between Savannah and Jacksonville, FL. The Jekyll Island Authority is a self-supporting authority of the State of Georgia responsible for the overall management and stewardship of Jekyll Island. Obtaining its operating revenues from leases, fees, and island amenity operations, income is used to maintain, develop, beautify, and promote Jekyll Island as a public beach resort and a world-class vacation and meeting destination. Jekyll Island does not receive any tax revenues for its operation.
Access Data Using Our API

Get company history
.png)
JIA Cyber Security News
This Tradition On Georgiaโs Jekyll Island Has Locals Looking For, And Returning In, Hidden Globes
For now 21 years, residents of Georgia's Jekyll Island have been hiding, or on the look out for, clear plastic globes around town as a nod toย ...

JIA Similar Companies

BCD Travel
BCD Travel helps companies travel smart and achieve more. We drive program adoption, cost savings and talent retention through digital experiences that simplify business travel. Our 15,000+ dedicated team members service clients in 170+ countries as we shape a sustainable future for business travel.

Europcar Mobility Group
Europcar Mobility Group is a global mobility player, with 75 years of mobility services expertise and a leading position in Europe. โWe help to change the way you moveโ is what we stand for and brings us together. More than ever, we're committed to delivering simple, seamless, innovative solutions

DER Touristik vormals REWE Touristik GmbH
DER TOURISTIK GROUP AUF WACHSTUMSKURS Die DER Touristik Group gehรถrt heute zu den fรผhrenden europรคischen Reisekonzernen. Sie vereint unter ihrem Dach verschiedene Geschรคftsfelder rund ums Thema Reisen und agiert seit 2018 strukturell als Holding mit vier Divisions. Durch den Zukauf der europรคische

Carnival Cruise Line
Since our founding in 1972, Carnival Cruise Line โ "The Worldโs Most Popular Cruise Lineยฎโ โ carries millions of passengers every year. We offer a fun and unique career destination for a wide range of professionals in Marketing, IT, Accounting/Audit, Finance, Marine Operations and Human Resources, j

Costa Crociere S.p.A.
Costa belongs to the Carnival Corporation & plc Group, listed on the London and New York stock exchanges, the largest cruise company in the world. Costa, the only Italian cruise company flying the Italian flag, has been sailing the worldโs seas for more than 75 years, offering its guests a differe

Carnival Cruise Line
Since our founding in 1972, Carnival Cruise Line โ "The Worldโs Most Popular Cruise Lineยฎโ โ carries millions of passengers every year. We offer a fun and unique career destination for a wide range of professionals in Marketing, IT, Accounting/Audit, Finance, Marine Operations and Human Resources, j

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
JIA CyberSecurity History Information
How many cyber incidents has JIA faced?
Total Incidents: According to Rankiteo, JIA has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at JIA?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
How does JIA detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Coastal Computing.
Incident Details
Can you provide details on each incident?

Incident : Ransomware Attack
Title: Jekyll Island Authority Ransomware Attack
Description: Jekyll Island Authority discovered that they were hit in a ransomware attack in September 2020. The third-party firm Coastal Computing spent over 340 hours handling the attack. Some of the company's internal information along with a few customers' personal information was compromised in the attack. The authority invested around $25,000 in security measures to secure their network after the attack.
Date Detected: September 2020
Type: Ransomware Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware Attack JEK121614222
Data Compromised: Internal information, Customers' personal information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal information and Customers' personal information.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware Attack JEK121614222
Third Party Assistance: Coastal Computing
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Coastal Computing.
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware Attack JEK121614222
Type of Data Compromised: Internal information, Customers' personal information
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Coastal Computing.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on September 2020.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Internal information and Customers' personal information.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Coastal Computing.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Internal information and Customers' personal information.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
