Morgan County 911 Company Cyber Security Posture

morgan911.org

Morgan County 911 answers all 911 calls originating in Morgan County and its municipalities and dispatches all fire and ambulance resources, five police departments, and the countyโ€™s rescue squad. Morgan County 911 provides the technical services that support public safety, including addressing and mapping services, dispatch software, and the countywide radio system.

MC9 Company Details

Linkedin ID:

morgan-county-911

Employees number:

56 employees

Number of followers:

108.0

NAICS:

922

Industry Type:

Public Safety

Homepage:

morgan911.org

IP Addresses:

Scan still pending

Company ID:

MOR_1041292

Scan Status:

In-progress

AI scoreMC9 Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Morgan County 911 Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

Morgan County 911 Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Morgan County 911Ransomware7537/2025MOR558072725Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Morgan County 911 experienced a cybersecurity incident which disrupted administration systems for several days. While dispatch functions such as radio communications, call history, and CAD systems were not affected, the Sheriffโ€™s Office network was disconnected from the 911 system as a precaution, resulting in the loss of access to the Inmate Roster for a week. The attack was claimed by the ransomware gang Qilin, which uploaded various documents including financial records. The attack was not a phishing incident but more of a brute force attack. No critical systems were affected, and the ability to operate as a 911 Center remained intact.

Morgan County 911 Company Subsidiaries

SubsidiaryImage

Morgan County 911 answers all 911 calls originating in Morgan County and its municipalities and dispatches all fire and ambulance resources, five police departments, and the countyโ€™s rescue squad. Morgan County 911 provides the technical services that support public safety, including addressing and mapping services, dispatch software, and the countywide radio system.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=morgan-county-911' -H 'apikey: YOUR_API_KEY_HERE'
newsone

MC9 Cyber Security News

2025-05-19T07:00:00.000Z
Morgan County, Ala., 911 Takes Precautions Amid Cyber Event

Administrative systems at the county 911 center were impacted by a cybersecurity incident, though radio communications and certain dispatchย ...

2025-02-05T08:00:00.000Z
Elliott talks state treasurer role, record investment at Greenwood Rotary

Indiana's state treasurer gave a behind-the-scenes look at his job and responsibilities before Greenwood Rotarians on Monday.

2025-04-10T07:00:00.000Z
Children, Smartwatches Cause Most Accidental 911 Calls in Alabama

Officials in Alabama's Morgan and Limestone counties report that a child playing with a parent's smartphone is the most common cause of anย ...

2024-03-13T07:00:00.000Z
Pa. local governments want long-term state money for cybersecurity as federal grant fills the gap

Rising cybersecurity costs in Pennsylvania aren't adequately addressed in Gov. Josh Shapiro's budget proposal, local officials say.

2022-10-25T07:00:00.000Z
Indiana treasurer candidates say greater transparency, enhanced cybersecurity among priorities

Indiana treasurer candidates say greater transparency, enhanced cybersecurity among priorities ยท Indiana's executive government roles ยท Governorย ...

2022-09-20T07:00:00.000Z
Hackers post residents' data stolen in Suffolk cyberattack

Postings of county documents could contain increasingly sensitive information as hackers press their demands for ransom, a cybersecurityย ...

2016-04-11T07:00:00.000Z
Ex-NYSE Chief Who Re-Opened Exchange After 9/11 Attacks Returns To Speak On Cybersecurity

Former NYSE chairman and CEO Richard "Dick" Grasso will deliver a keynote at the Cyber Investing Summit on May 3rd.

similarCompanies

MC9 Similar Companies

DEKRA

DEKRA has been active in the field of safety for almost 100 years. Founded in 1925 in Berlin as Deutscher Kraftfahrzeug-รœberwachungs-Verein e.V., it is today one of the worldโ€™s leading expert organizations. DEKRA SE is a subsidiary of DEKRA e.V. and manages the Groupโ€™s operating business. In 2022,

TรœV Rheinland Group

Neutral, independent third party For more than 150 years, TรœV Rheinland has stood for ensuring quality, safety, and efficiency in conjunction with people, the environment, and technology. As a neutral, independent third party, we test, accompany, develop, promote and certify products, plants, proc

TรœV SรœD

TรœV SรœD is the trusted partner of choice for safety, security and sustainability solutions. Our community of experts is passionate about technology and united by the belief that technology should better peopleโ€™s lives. We work alongside our customers to anticipate and capitalize on technological d

Bundesministerium fโˆšยบr Inneres (BMI)

Das Bundesministerium fโˆšยบr Inneres (BMI) ist die Sicherheitsbehโˆšโˆ‚rde III. Instanz. Leiter ist der Bundesminister fโˆšยบr Inneres, derzeit Mag. Gerhard Karner. Das BMI ist zustโˆšยงndig fโˆšยบr das Sicherheitswesen, die Staatsgrenzen und die Organisation des Dienstbetriebs der Bundespolizei. Personenstandsan

Belgische federale politie

Belgische federale politie Alle informatie over deze publieke onderneming is terug te vinden op http://www.fedpol.be Het Belgische politielandschap wordt gevormd door een geรฏntegreerde politie met een lokale en een federale component. De federale politie verzorgt de gespecialiseerde steun aan

GNR - Guarda Nacional Republicana

A Guarda Nacional Republicana โˆšยฉ uma forโˆšรŸa de seguranโˆšรŸa de natureza militar, que tem por missโˆšยฃo, no โˆšยขmbito dos sistemas nacionais de seguranโˆšรŸa e proteโˆšรŸโˆšยฃo, assegurar a legalidade democrโˆšยฐtica, garantir a seguranโˆšรŸa interna e os direitos dos cidadโˆšยฃos, bem como colaborar na execuโˆšรŸโˆšยฃo da polโˆšโ‰ t

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

MC9 CyberSecurity History Information

How many cyber incidents has MC9 faced?

Total Incidents: According to Rankiteo, MC9 has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at MC9?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

How does MC9 detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Disconnected Sheriffโ€™s Office network from 911 system.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Ransomware Attack on Morgan County 911

Description: Morgan County 911 experienced a ransomware attack in May 2025, claimed by the Qilin ransomware gang. The attack disrupted administrative systems but did not affect critical dispatch functions. The Sheriffโ€™s Office network was temporarily disconnected from the 911 system as a precaution.

Date Detected: 2025-05-14

Date Resolved: 2025-05-20

Type: Ransomware

Attack Vector: Brute Force

Threat Actor: Qilin

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware MOR558072725

Systems Affected: Administrative Systems, Sheriffโ€™s Office Network

Downtime: Several days

Operational Impact: Temporary disconnection of Sheriffโ€™s Office network from 911 system

Which entities were affected by each incident?

Incident : Ransomware MOR558072725

Entity Type: Government

Industry: Emergency Services

Location: Decatur, Alabama

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware MOR558072725

Containment Measures: Disconnected Sheriffโ€™s Office network from 911 system

Data Breach Information

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Disconnected Sheriffโ€™s Office network from 911 system.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware MOR558072725

Ransomware Strain: Qilin

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Ransomware MOR558072725

Recommendations: Citizens and employees should remain on high alert for phishing messages and monitor accounts for suspicious activity.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Citizens and employees should remain on high alert for phishing messages and monitor accounts for suspicious activity..

References

Where can I find more information about each incident?

Incident : Ransomware MOR558072725

Source: Comparitech

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Comparitech.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Qilin.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2025-05-14.

What was the most recent incident resolved?

Most Recent Incident Resolved: The most recent incident resolved was on 2025-05-20.

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Administrative Systems, Sheriffโ€™s Office Network.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disconnected Sheriffโ€™s Office network from 911 system.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Citizens and employees should remain on high alert for phishing messages and monitor accounts for suspicious activity..

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Comparitech.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge