PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Cyber Security Posture

permanentportfoliofunds.com

None

PHAML Company Details

Linkedin ID:

pacific-heights-asset-management-llc

Employees number:

11 employees

Number of followers:

20.0

NAICS:

52

Industry Type:

Financial Services

Homepage:

permanentportfoliofunds.com

IP Addresses:

Scan still pending

Company ID:

PAC_1453994

Scan Status:

In-progress

AI scorePHAML Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
PACIFIC HEIGHTS ASSET MANAGEMENT, LLCVulnerability85406/2018PAC1239822Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A potential data security incident has resulted in the inadvertent exposure of some patientsโ€™ personal and health insurance information. Although at this time there is no evidence that patientsโ€™ information was actually compromised or not but Ms. Bowden, a board licensed acupuncturist has taken steps to notify any patients who may have been affected by this incident. This includes sending letters to anyone whose information might have been exposed. Ms. Bowden discovered that her Pacific Heights office had been burglarized and a computer was stolen. Although the computer was password protected, it contained patientsโ€™ names, addresses, contact information, dates of service, and diagnosis codes. Social Security Numbers or financial/billing information was not involved in this incident.

PACIFIC HEIGHTS ASSET MANAGEMENT, LLC Company Subsidiaries

SubsidiaryImage

None

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=pacific-heights-asset-management-llc' -H 'apikey: YOUR_API_KEY_HERE'
newsone

PHAML Cyber Security News

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Boosts Stock Position in Murphy Oil Corporation (NYSE:MUR)

None

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Has $4.10 Million Stock Holdings in IPG Photonics Corporation (NASDAQ:IPGP)

None

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Has $11.77 Million Holdings in Ovintiv Inc. (NYSE:OVV)

None

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Increases Stock Holdings in State Street Corporation (NYSE:STT)

None

2025-07-10T07:00:00.000Z
Alpha Cubed Investments LLC Purchases 203,799 Shares of Digital Realty Trust, Inc. (NYSE:DLR)

None

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Raises Holdings in OUTFRONT Media Inc. (NYSE:OUT)

None

2025-07-07T07:00:00.000Z
Pacific Heights Asset Management LLC Acquires 20,000 Shares of HF Sinclair Corporation (NYSE:DINO)

None

2025-07-07T07:00:00.000Z
Prologis, Inc. (NYSE:PLD) Position Boosted by Pacific Heights Asset Management LLC

None

2025-07-07T07:00:00.000Z
Parker-Hannifin Corporation (NYSE:PH) Shares Sold by Pacific Heights Asset Management LLC

None

similarCompanies

PHAML Similar Companies

SONAE

Sonae exists to create a lasting positive impact on businesses, people, communities and on the planet. Managing a diverse portfolio of businesses in retail, financial services, technology, investments, shopping centres and telecommunications, Sonae makes the most of its expertise and pushes itself

Bloomberg

Bloomberg is a global leader in business and financial information, delivering trusted data, news, and insights that bring transparency, efficiency, and fairness to markets. The company helps connect influential communities across the global financial ecosystem via reliable technology solutions that

We help make money work for the world โ€” managing it, moving it and keeping it safe. As a leading global financial services company at the center of the worldโ€™s financial system, we touch nearly 20% of the worldโ€™s investable assets. Today we help over 90% of Fortune 100 companies and nearly all the t

Charles Schwab

Charles Schwab is a different kind of investment services firm โ€“ one that strives to disrupt the status quo of the traditional Wall Street approach on behalf of our clients. We believe today, as we did on Day 1, that when you find ways to improve the investing experience for your clients, then busin

Ministry of Finance of the Russian Federation

The Ministry of Finance (Minfin) is a federal executive body responsible for drafting and implementing government policy and legal regulation in the field of budget, tax, insurance, foreign exchange, banking, credit cooperatives, microfinance, financial markets, public debt, auditing, accounting and

Wells Fargo Advisors

With financial advisors serving our clients in all 50 states, Wells Fargo Advisors is headquartered in St. Louis. At the end of the day, we help our clients succeed financially. For us โ€“ our Financial Advisors and thousands of other team members โ€“ it's a commitment. It's about honoring our relation

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PHAML CyberSecurity History Information

How many cyber incidents has PHAML faced?

Total Incidents: According to Rankiteo, PHAML has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at PHAML?

Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.

How does PHAML detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Sending letters to affected patients.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Security Incident at Pacific Heights Office

Description: A potential data security incident has resulted in the inadvertent exposure of some patientsโ€™ personal and health insurance information due to a burglary and theft of a computer from Ms. Bowden's Pacific Heights office.

Type: Data Breach

Attack Vector: Physical Theft

Vulnerability Exploited: Physical Security

Threat Actor: Burglar

Motivation: Theft of Computer Equipment

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Physical Access.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach PAC1239822

Data Compromised: Patients' names, Addresses, Contact information, Dates of service, Diagnosis codes

Systems Affected: Computer

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Health Information.

Which entities were affected by each incident?

Incident : Data Breach PAC1239822

Entity Type: Healthcare Provider

Industry: Healthcare

Location: Pacific Heights

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach PAC1239822

Communication Strategy: Sending letters to affected patients

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach PAC1239822

Type of Data Compromised: Personal Information, Health Information

Sensitivity of Data: Medium

Personally Identifiable Information: Names, Addresses, Contact information

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Sending letters to affected patients.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach PAC1239822

Customer Advisories: Letters to affected patients

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Letters to affected patients.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach PAC1239822

Entry Point: Physical Access

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach PAC1239822

Root Causes: Physical Theft

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Burglar.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Patients' names, Addresses, Contact information, Dates of service and Diagnosis codes.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Computer.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patients' names, Addresses, Contact information, Dates of service and Diagnosis codes.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an Letters to affected patients.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Physical Access.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge