
PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Cyber Security Posture
permanentportfoliofunds.comNone
PHAML Company Details
pacific-heights-asset-management-llc
11 employees
20.0
52
Financial Services
permanentportfoliofunds.com
Scan still pending
PAC_1453994
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
PACIFIC HEIGHTS ASSET MANAGEMENT, LLC | Vulnerability | 85 | 4 | 06/2018 | PAC1239822 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: A potential data security incident has resulted in the inadvertent exposure of some patientsโ personal and health insurance information. Although at this time there is no evidence that patientsโ information was actually compromised or not but Ms. Bowden, a board licensed acupuncturist has taken steps to notify any patients who may have been affected by this incident. This includes sending letters to anyone whose information might have been exposed. Ms. Bowden discovered that her Pacific Heights office had been burglarized and a computer was stolen. Although the computer was password protected, it contained patientsโ names, addresses, contact information, dates of service, and diagnosis codes. Social Security Numbers or financial/billing information was not involved in this incident. |
PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Subsidiaries

None
Access Data Using Our API

Get company history
.png)
PHAML Cyber Security News
Pacific Heights Asset Management LLC Boosts Stock Position in Murphy Oil Corporation (NYSE:MUR)
None
Pacific Heights Asset Management LLC Has $4.10 Million Stock Holdings in IPG Photonics Corporation (NASDAQ:IPGP)
None
Pacific Heights Asset Management LLC Has $11.77 Million Holdings in Ovintiv Inc. (NYSE:OVV)
None
Pacific Heights Asset Management LLC Increases Stock Holdings in State Street Corporation (NYSE:STT)
None
Alpha Cubed Investments LLC Purchases 203,799 Shares of Digital Realty Trust, Inc. (NYSE:DLR)
None
Pacific Heights Asset Management LLC Raises Holdings in OUTFRONT Media Inc. (NYSE:OUT)
None
Pacific Heights Asset Management LLC Acquires 20,000 Shares of HF Sinclair Corporation (NYSE:DINO)
None
Prologis, Inc. (NYSE:PLD) Position Boosted by Pacific Heights Asset Management LLC
None
Parker-Hannifin Corporation (NYSE:PH) Shares Sold by Pacific Heights Asset Management LLC
None

PHAML Similar Companies

SONAE
Sonae exists to create a lasting positive impact on businesses, people, communities and on the planet. Managing a diverse portfolio of businesses in retail, financial services, technology, investments, shopping centres and telecommunications, Sonae makes the most of its expertise and pushes itself

Bloomberg
Bloomberg is a global leader in business and financial information, delivering trusted data, news, and insights that bring transparency, efficiency, and fairness to markets. The company helps connect influential communities across the global financial ecosystem via reliable technology solutions that

BNY
We help make money work for the world โ managing it, moving it and keeping it safe. As a leading global financial services company at the center of the worldโs financial system, we touch nearly 20% of the worldโs investable assets. Today we help over 90% of Fortune 100 companies and nearly all the t

Charles Schwab
Charles Schwab is a different kind of investment services firm โ one that strives to disrupt the status quo of the traditional Wall Street approach on behalf of our clients. We believe today, as we did on Day 1, that when you find ways to improve the investing experience for your clients, then busin

Ministry of Finance of the Russian Federation
The Ministry of Finance (Minfin) is a federal executive body responsible for drafting and implementing government policy and legal regulation in the field of budget, tax, insurance, foreign exchange, banking, credit cooperatives, microfinance, financial markets, public debt, auditing, accounting and

Wells Fargo Advisors
With financial advisors serving our clients in all 50 states, Wells Fargo Advisors is headquartered in St. Louis. At the end of the day, we help our clients succeed financially. For us โ our Financial Advisors and thousands of other team members โ it's a commitment. It's about honoring our relation

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
PHAML CyberSecurity History Information
How many cyber incidents has PHAML faced?
Total Incidents: According to Rankiteo, PHAML has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at PHAML?
Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.
How does PHAML detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Sending letters to affected patients.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Security Incident at Pacific Heights Office
Description: A potential data security incident has resulted in the inadvertent exposure of some patientsโ personal and health insurance information due to a burglary and theft of a computer from Ms. Bowden's Pacific Heights office.
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Physical Security
Threat Actor: Burglar
Motivation: Theft of Computer Equipment
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Physical Access.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach PAC1239822
Data Compromised: Patients' names, Addresses, Contact information, Dates of service, Diagnosis codes
Systems Affected: Computer
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Health Information.
Which entities were affected by each incident?

Incident : Data Breach PAC1239822
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Pacific Heights
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach PAC1239822
Communication Strategy: Sending letters to affected patients
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach PAC1239822
Type of Data Compromised: Personal Information, Health Information
Sensitivity of Data: Medium
Personally Identifiable Information: Names, Addresses, Contact information
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Sending letters to affected patients.
Stakeholder and Customer Advisories
Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach PAC1239822
Customer Advisories: Letters to affected patients
What advisories does the company provide to stakeholders and customers following an incident?
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Letters to affected patients.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach PAC1239822
Entry Point: Physical Access
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Data Breach PAC1239822
Root Causes: Physical Theft
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Burglar.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Patients' names, Addresses, Contact information, Dates of service and Diagnosis codes.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Computer.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patients' names, Addresses, Contact information, Dates of service and Diagnosis codes.
Stakeholder and Customer Advisories
What was the most recent customer advisory issued?
Most Recent Customer Advisory: The most recent customer advisory issued was was an Letters to affected patients.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Physical Access.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
