
Rangely District Hospital Company Cyber Security Posture
rangelyhospital.orgRangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.
RDH Company Details
rangely-district-hospital
66 employees
238.0
62
Hospitals and Health Care
rangelyhospital.org
Scan still pending
RAN_1076964
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Rangely District Hospital Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Rangely District Hospital Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Rangely District Hospital | Ransomware | 85 | 4 | 04/2020 | RAN2105123 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospitalโs computer network were attacked by ransomware, including some files containing patientsโ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information. |
Rangely District Hospital Company Subsidiaries

Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.
Access Data Using Our API

Get company history
.png)
RDH Cyber Security News
Ransomware attack leaves 5 years of patient records inaccessible at Colo. hospital
"The investigation determined that the ransomware was launched to lock RDH out of its files in an effort to extort money; it did not result inย ...
Rural Colorado Hospitals: โWeโre Stretched to the Maxโ
โThey were confused from lacking oxygen and went home sick. Then they realized they were in bigger trouble,โ said Harshbarger. โThey were scaredย ...
After a small Colorado city paid cyber attackers a ransom, thereโs concern about the rest of the state
Lafayette became yet another victim of a cyber attack late last month that hijacked computer files and resulted in a disruption to the city'sย ...
UCSF pays $1.14 million to decrypt files after ransomware attack
UCSF on Friday announced that it had "made the difficult decision" to pay a $1.14 million ransom and unlock the important data that had been encrypted in aย ...

RDH Similar Companies

Henry Ford Health
*Job seekers: please be aware of fraudulent job postings and phishing scams via LinkedIn. Henry Ford Health only contacts applicants through our human resources department and via a corporate email address. Here are some tips to be aware of: http://ow.ly/Kc0o50EKory Serving communities across Mich

Aneurin Bevan University Health Board
Aneurin Bevan University Health Board was established on the 1st October 2009 and covers the areas of Blaenau Gwent, Caerphilly, Monmouthshire, Newport, Torfaen and South Powys. The Health Board employs over 14,000 staff, two thirds of whom are involved in direct patient care. There are more than

Siemens Healthineers
Siemens Healthineers is a leading medtech company with over 125 years of experience. We pioneer breakthroughs in healthcare. For everyone. Everywhere. Sustainably. Our portfolio, spanning in vitro and in vivo diagnostics to image-guided therapy and cancer care, is crucial for clinical decision-makin

Vanderbilt University Medical Center
We are committed to excellence in patient care, biomedical research, and medical education and training. We thrive on challenges, embrace collaboration and champion innovation. We are a growing health system with 7 hospitals and hundreds of clinics throughout the Mid-South as well as one of the nati

St. Olavs hospital, Trondheim University Hospital
St. Olavs hospital, Trondheim University Hospital, is integrated with NTNU, the Norwegian University of Science and Technology in Trondheim, and owned by the Central Norway Regional Health Authority. The main tasks of the Hospital (public health enterprise) are patient treatment, the teaching of pa

Trinity Health
Trinity Health is one of the largest not-for-profit, Catholic health care systems in the nation. It is a family of 123,000 colleagues and nearly 27,000 physicians and clinicians caring for diverse communities across 26 states. Nationally recognized for care and experience, the Trinity Health system

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
RDH CyberSecurity History Information
How many cyber incidents has RDH faced?
Total Incidents: According to Rankiteo, RDH has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at RDH?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Ransomware Attack on Rangely District Hospital
Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospitalโs computer network were attacked by ransomware, including some files containing patientsโ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.
Date Detected: April 2020
Type: Ransomware
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware RAN2105123
Data Compromised: names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, health insurance and claims and billing information
Systems Affected: hospitalโs computer network, software to access database records
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications and health insurance and claims and billing information.
Which entities were affected by each incident?
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware RAN2105123
Type of Data Compromised: names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, health insurance and claims and billing information
Sensitivity of Data: High
Personally Identifiable Information: True
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware RAN2105123
Data Encryption: True
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on April 2020.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications and health insurance and claims and billing information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident were hospitalโs computer network, software to access database records.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, dates of birth, social security numbers, addresses, telephone numbers, driverโs license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications and health insurance and claims and billing information.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
