Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Advancing Health. Personalizing Care. Memorial Hermann Health System is a nonprofit, values-driven, community-owned health system dedicated to improving health. A fully integrated health system with more than 260 care delivery sites throughout the Greater Houston area, Memorial Hermann is committed to delivering safe, high-quality, patient-centered care and offers clinical expertise, innovation and cutting-edge technology to all patients.

Memorial Hermann Health System A.I CyberSecurity Scoring

MHHS

Company Details

Linkedin ID:

memorialhermann

Employees number:

19,509

Number of followers:

124,465

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

memorialhermann.org

IP Addresses:

0

Company ID:

MEM_1540044

Scan Status:

In-progress

AI scoreMHHS Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/memorialhermann.jpeg
MHHS Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreMHHS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/memorialhermann.jpeg
MHHS Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

MHHS Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Memorial Hermann Health SystemBreach90502/2022NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Memorial Hermann Health System notified thousands of its customers of the data breach after one of its contracted vendors, Advent Health Partners, suffered a cyber attack. Unauthorized access and suspicious activities were noticed on an employee's email accounts with data from Memorial Hermann including PHI: first names, last names, dates of birth, social security numbers, financial and medical information. All the impacted customers were notified and given free credit monitoring services.

Memorial Hermann Health SystemBreach6037/2014NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The U.S. Department of Health and Human Services reported on August 29, 2014, that Memorial Hermann Health System experienced a data breach due to unauthorized access/disclosure on July 7, 2014, affecting approximately 10,604 individuals' protected health information (PHI). The incident involved a workforce member accessing the information inappropriately through a desktop computer, and corrective actions were taken post-incident, including the termination of the workforce member and the expansion of the IT audit program.

Memorial Hermann Health System
Breach
Severity: 90
Impact: 5
Seen: 02/2022
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Memorial Hermann Health System notified thousands of its customers of the data breach after one of its contracted vendors, Advent Health Partners, suffered a cyber attack. Unauthorized access and suspicious activities were noticed on an employee's email accounts with data from Memorial Hermann including PHI: first names, last names, dates of birth, social security numbers, financial and medical information. All the impacted customers were notified and given free credit monitoring services.

Memorial Hermann Health System
Breach
Severity: 60
Impact: 3
Seen: 7/2014
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The U.S. Department of Health and Human Services reported on August 29, 2014, that Memorial Hermann Health System experienced a data breach due to unauthorized access/disclosure on July 7, 2014, affecting approximately 10,604 individuals' protected health information (PHI). The incident involved a workforce member accessing the information inappropriately through a desktop computer, and corrective actions were taken post-incident, including the termination of the workforce member and the expansion of the IT audit program.

Ailogo

MHHS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for MHHS

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Memorial Hermann Health System in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Memorial Hermann Health System in 2026.

Incident Types MHHS vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Memorial Hermann Health System in 2026.

Incident History — MHHS (X = Date, Y = Severity)

MHHS cyber incidents detection timeline including parent company and subsidiaries

MHHS Company Subsidiaries

SubsidiaryImage

Advancing Health. Personalizing Care. Memorial Hermann Health System is a nonprofit, values-driven, community-owned health system dedicated to improving health. A fully integrated health system with more than 260 care delivery sites throughout the Greater Houston area, Memorial Hermann is committed to delivering safe, high-quality, patient-centered care and offers clinical expertise, innovation and cutting-edge technology to all patients.

Loading...
similarCompanies

MHHS Similar Companies

Labcorp

Clear and confident health care decisions begin with questions. At Labcorp, we’re constantly in pursuit of answers. As a global leader of innovative and comprehensive laboratory services, we help doctors, hospitals, pharmaceutical companies, researchers and patients make clear and confident decisi

Beth Israel Deaconess Medical Center

Beth Israel Deaconess Medical Center (BIDMC) is part of Beth Israel Lahey Health, a new health care system that brings together academic medical centers and teaching hospitals, community and specialty hospitals, more than 4,000 physicians and 35,000 employees in a shared mission to expand access to

Bon Secours

Bon Secours Health System, Inc. based in Marriottsville, Maryland, is a $3.2 billion dollar not-for-profit Catholic health system that owns, manages or joint ventures 18 acute care, 5 long term care, 4 assisted living, 6 retirement communities/senior housing, 14 home care and hospice services, and o

Oregon Health & Science University

At OHSU, we deliver breakthroughs for better health. We're driven by the belief that better health starts with innovations in the lab, in the classroom, at the bedside and in our communities. From cancer to Alzheimer's to cardiovascular care, we collaborate every day to identify and deliver new wa

Omega Healthcare Management Services

Founded in 2003, Omega Healthcare Management Services® (Omega Healthcare) is an AI-driven healthcare solutions company that partners across the healthcare ecosystem to deliver breakthrough results by reimagining and elevating revenue operations. Powered by the Omega Digital Platform®, our agentic AI

Sentara Health

Sentara Health, an integrated, not-for-profit health care delivery system, celebrates more than 135 years in pursuit of its mission - "we improve health every day." Sentara is one of the largest health systems in the U.S. Mid-Atlantic and Southeast, and among the top 20 largest not-for-profit integr

As a premier care provider since 1985, Genesis HealthCare is a holding company with subsidiaries that, on a combined basis, provide services to skilled nursing facilities and senior living communities. Genesis also specializes in contract rehabilitation therapy, respiratory therapy, physician servic

Ardent Health

Ardent Health is a leading provider of healthcare in growing mid-sized urban communities across the U.S. With a focus on people and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent delivers

Cincinnati Children's

Cincinnati Children’s, a nonprofit academic medical center established in 1883, offers services from well-child care to treatment for the most rare and complex conditions. It is the Department of Pediatrics at the University of Cincinnati College of Medicine and trains more than 600 residents and cl

newsone

MHHS CyberSecurity News

February 26, 2026 08:00 AM
Trends In Healthcare Data Breach Statistics

Our healthcare data breach statistics clearly show an upward trend in data breaches since 2009, when OCR first started publishing data...

February 11, 2026 11:06 AM
At least 12 major hospitals, health systems affected by global IT outage

Several major hospitals and health systems across the United States reported being impacted by Friday's global IT outage caused by CrowdStrike.

February 05, 2026 08:00 AM
Houston Memorial Hermann doctor indicted, accused of blocking transplants by falsifying records

A Houston surgeon has been indicted in federal court on charges that accuse him of falsifying medical records that made patients ineligible...

January 28, 2026 08:00 AM
HIPAA Violation Cases - Updated 2026

MMG Fusion. MMG Fusion, a provider of software solutions to oral healthcare providers, was investigated by OCR in response to a complaint...

January 20, 2026 08:00 AM
StrawberryFrog Breaks Anthemic Campaign for Memorial Hermann

Differentiating Creative Work for Houston Health System. StrawberryFrog, the independent, full service, creative advertising agency,...

December 17, 2025 08:00 AM
N.Y. doles out $300M to fund health IT, hospital cybersecurity projects

New York state plans to invest $300 million in efforts to modernize hospital IT infrastructure, bolster cybersecurity and expand telehealth...

December 16, 2025 08:00 AM
New York awards hospitals more than $300M for IT and cyber investments

The state announces new funding aimed at expanding electronic health records, strengthening cybersecurity, and increasing telehealth and...

December 12, 2025 04:59 PM
Rome Memorial Hospital Gets $18M for Health Technology Upgrade

Rome Health will receive over $18 million in State funding to enhance its health information technology.

October 27, 2025 07:00 AM
Memorial Hermann Health System Appoints Guy Giesecke as CEO

Memorial Hermann Health System is proud to announce that Guy B. Giesecke, DHA, is appointed Senior Vice President and Chief Executive...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

MHHS CyberSecurity History Information

Official Website of Memorial Hermann Health System

The official website of Memorial Hermann Health System is http://www.memorialhermann.org/.

Memorial Hermann Health System’s AI-Generated Cybersecurity Score

According to Rankiteo, Memorial Hermann Health System’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.

How many security badges does Memorial Hermann Health System’ have ?

According to Rankiteo, Memorial Hermann Health System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Memorial Hermann Health System been affected by any supply chain cyber incidents ?

According to Rankiteo, Memorial Hermann Health System has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Memorial Hermann Health System have SOC 2 Type 1 certification ?

According to Rankiteo, Memorial Hermann Health System is not certified under SOC 2 Type 1.

Does Memorial Hermann Health System have SOC 2 Type 2 certification ?

According to Rankiteo, Memorial Hermann Health System does not hold a SOC 2 Type 2 certification.

Does Memorial Hermann Health System comply with GDPR ?

According to Rankiteo, Memorial Hermann Health System is not listed as GDPR compliant.

Does Memorial Hermann Health System have PCI DSS certification ?

According to Rankiteo, Memorial Hermann Health System does not currently maintain PCI DSS compliance.

Does Memorial Hermann Health System comply with HIPAA ?

According to Rankiteo, Memorial Hermann Health System is not compliant with HIPAA regulations.

Does Memorial Hermann Health System have ISO 27001 certification ?

According to Rankiteo,Memorial Hermann Health System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Memorial Hermann Health System

Memorial Hermann Health System operates primarily in the Hospitals and Health Care industry.

Number of Employees at Memorial Hermann Health System

Memorial Hermann Health System employs approximately 19,509 people worldwide.

Subsidiaries Owned by Memorial Hermann Health System

Memorial Hermann Health System presently has no subsidiaries across any sectors.

Memorial Hermann Health System’s LinkedIn Followers

Memorial Hermann Health System’s official LinkedIn profile has approximately 124,465 followers.

NAICS Classification of Memorial Hermann Health System

Memorial Hermann Health System is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Memorial Hermann Health System’s Presence on Crunchbase

Yes, Memorial Hermann Health System has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/memorial-hermann-foundation.

Memorial Hermann Health System’s Presence on LinkedIn

Yes, Memorial Hermann Health System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/memorialhermann.

Cybersecurity Incidents Involving Memorial Hermann Health System

As of March 29, 2026, Rankiteo reports that Memorial Hermann Health System has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Memorial Hermann Health System has an estimated 32,295 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Memorial Hermann Health System ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Memorial Hermann Health System detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notified all impacted customers and offered free credit monitoring services, and remediation measures with termination of the workforce member, remediation measures with expansion of the it audit program..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Memorial Hermann Health System Data Breach

Description: Memorial Hermann Health System notified thousands of its customers of the data breach after one of its contracted vendors, Advent Health Partners, suffered a cyber attack. Unauthorized access and suspicious activities were noticed on an employee's email accounts with data from Memorial Hermann including PHI: first names, last names, dates of birth, social security numbers, financial and medical information. All the impacted customers were notified and given free credit monitoring services.

Type: Data Breach

Attack Vector: Email Compromise

Incident : Data Breach

Title: Memorial Hermann Health System Data Breach

Description: Unauthorized access/disclosure of protected health information (PHI) affecting approximately 10,604 individuals.

Date Detected: 2014-07-07

Date Publicly Disclosed: 2014-08-29

Type: Data Breach

Attack Vector: Unauthorized Access

Threat Actor: Internal

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Compromise.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach MEM12145522

Data Compromised: First names, Last names, Dates of birth, Social security numbers, Financial information, Medical information

Incident : Data Breach MEM308071625

Data Compromised: Protected health information (phi)

Systems Affected: Desktop Computer

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Phi, Financial Information, and Protected Health Information (PHI).

Which entities were affected by each incident ?

Incident : Data Breach MEM12145522

Entity Name: Memorial Hermann Health System

Entity Type: Healthcare Provider

Industry: Healthcare

Customers Affected: thousands

Incident : Data Breach MEM308071625

Entity Name: Memorial Hermann Health System

Entity Type: Healthcare Provider

Industry: Healthcare

Customers Affected: 10604

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach MEM12145522

Communication Strategy: Notified all impacted customers and offered free credit monitoring services

Incident : Data Breach MEM308071625

Remediation Measures: Termination of the workforce memberExpansion of the IT audit program

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach MEM12145522

Type of Data Compromised: Phi, Financial information

Sensitivity of Data: High

Personally Identifiable Information: first nameslast namesdates of birthsocial security numbers

Incident : Data Breach MEM308071625

Type of Data Compromised: Protected Health Information (PHI)

Number of Records Exposed: 10604

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Termination of the workforce member, Expansion of the IT audit program, .

References

Where can I find more information about each incident ?

Incident : Data Breach MEM308071625

Source: U.S. Department of Health and Human Services

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: U.S. Department of Health and Human Services.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified all impacted customers and offered free credit monitoring services.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach MEM12145522

Entry Point: Email Compromise

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Internal.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2014-07-07.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-08-29.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were first names, last names, dates of birth, social security numbers, financial information, medical information, , Protected Health Information (PHI) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Desktop Computer.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical information, first names, dates of birth, last names, social security numbers, financial information and Protected Health Information (PHI).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 110.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is U.S. Department of Health and Human Services.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Compromise.

cve

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=memorialhermann' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge