dop Company Cyber Security Posture

dop.com.au

Since 1990, dopโ„ข has always been searching for new ways to solveโ€‹ problems, connect individuals into strong teams and unite the unique.โ€‹ Just like you, just like this industry, just like technology itself โ€” weโ€‹ are constantly evolving. From pagers, to mobile to internet and nowโ€‹ artificial intelligence, technology continues to push the boundariesโ€‹ of whatโ€™s possible, shaping the future in ways we could have neverโ€‹ imagined โ€” but did.โ€‹ โ€‹Yours,โ€‹ dopโ„ข

dop Company Details

Linkedin ID:

schepisi-communications

Employees number:

71 employees

Number of followers:

1051.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

dop.com.au

IP Addresses:

Scan still pending

Company ID:

DOP_1556093

Scan Status:

In-progress

AI scoredop Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

dop Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

dop Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Schepisi CommunicationsRansomware100505/2021SCH1119322Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Melbourne-based Schepisi Communications was hit by Avaddon Windows ransomware. The attckers targted its order fulfilment system and syole Telstra business customer information, such as mobile phone numbers. The ransomware group gave 240 hours time to the company for negotiation otherwise they will release the data online.

dop Company Subsidiaries

SubsidiaryImage

Since 1990, dopโ„ข has always been searching for new ways to solveโ€‹ problems, connect individuals into strong teams and unite the unique.โ€‹ Just like you, just like this industry, just like technology itself โ€” weโ€‹ are constantly evolving. From pagers, to mobile to internet and nowโ€‹ artificial intelligence, technology continues to push the boundariesโ€‹ of whatโ€™s possible, shaping the future in ways we could have neverโ€‹ imagined โ€” but did.โ€‹ โ€‹Yours,โ€‹ dopโ„ข

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=schepisi-communications' -H 'apikey: YOUR_API_KEY_HERE'
newsone

dop Cyber Security News

2024-07-25T07:00:00.000Z
Live at MOMENTUM AI Summit San Jose

Settings ... Nagendra Bandaru, or Nag as he is more popularly referred to, is President and Managing Partner of the Enterprise Futuring Globalย ...

2025-06-27T07:00:00.000Z
Govt, industry hold talk on issues over marketing code for medical devices

The new code seeks to curb unethical marketing practices in the medical devices industry by barring medical representatives and device companiesย ...

2024-11-13T08:00:00.000Z
Deltaโ€™s Advanced IIoT Motion Controllers, Servo Drives, and HMI Solutions Featured at SPS Nuremberg 2024

Delta, a global leader in power management and a provider of IoT-based smart green solutions, will unveil its latest advancements in industrialย ...

2019-03-07T08:00:00.000Z
New exploitation techniques and defenses for DOP attacks

"The danger of data-oriented attacks, including DOP and the newer block-oriented programming (BOP), is that they do not tamper with the controlย ...

2019-11-20T08:00:00.000Z
Why cybersecurity should be taken more seriously by small and large companies alike (Sponsored)

With an increasing amount of cyber attacks around the globe it becomes clear that cybersecurity needs to be taken seriously by CEOs of small andย ...

2022-12-08T08:00:00.000Z
Capgemini recognized as a โ€œLeaderโ€ in Avasant 2022 RadarViewโ„ข Report for Digital Workplace Services

Capgemini offers comprehensive digital workplace services through its Employee Experience portfolio with integrated offerings such as Workspace,ย ...

2024-02-16T08:00:00.000Z
Penalties implored for data breaches

This year the committee will seriously punish organisations with personal data leaks caused by their careless or inadvertent actions, followingย ...

2024-03-30T07:00:00.000Z
Architecting cyber security for Ugandaโ€™s Fintech sector

Uganda's fintech ecosystem is thriving due to high skills availability, growing digital literacy, and the need for alternative financial inclusion models.

similarCompanies

dop Similar Companies

Vodafone

At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

PT. Indosat Tbk

Indosat Ooredoo Hutchison (IDX: ISAT) ("IOH"), are here with our vision to become the most preferred digital telecommunications company of Indonesia. The IOH merger combines two highly complementary businesses between PT Indosat Tbk (โ€œIndosat Ooredooโ€) and PT Hutchison 3 Indonesia to create a new wo

Amdocs South Africa Joint Enterprise

Amdocs established the Amdocs South Africa Joint Enterprise (ASAJE) as its prime representative in Africa region. ASAJEs aim is to expand Amdocs current presence in South Africa, focusing on South Africa telecom and financial services sectors. Show more

Telkom Indonesia

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public sh

Bouygues Telecom

๐ŸคCe qui fait notre singularitรฉ ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualitรฉ de nos relations avec notre famille, nos amis, ceux qui nous entourent est dรฉterminante pour notre bien-รชtre, notre santรฉ et mรชme notre espรฉrance de vie. Ce sont ces rela

Marconi PLC

Marconi Communications, the former telecommunications arm of the General Electric Company plc (GEC); was founded in August 1998 through the amalgamation of 'GEC Plessey Telecommunications' ( 'GPT') with other GEC subsidiaries namely - 'Marconi SpA', 'GEC Hong Kong' and 'ATC South Africa'. Later i

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

dop CyberSecurity History Information

How many cyber incidents has dop faced?

Total Incidents: According to Rankiteo, dop has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at dop?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Schepisi Communications Hit by Avaddon Ransomware

Description: Melbourne-based Schepisi Communications was hit by Avaddon Windows ransomware. The attackers targeted its order fulfillment system and stole Telstra business customer information, such as mobile phone numbers. The ransomware group gave 240 hours time to the company for negotiation otherwise they will release the data online.

Type: Ransomware

Threat Actor: Avaddon Ransomware Group

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware SCH1119322

Data Compromised: Telstra business customer information, Mobile phone numbers

Systems Affected: Order fulfillment system

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer information and Mobile phone numbers.

Which entities were affected by each incident?

Incident : Ransomware SCH1119322

Entity Type: Company

Industry: Communications

Location: Melbourne, Australia

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware SCH1119322

Type of Data Compromised: Customer information, Mobile phone numbers

Data Exfiltration: True

Personally Identifiable Information: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware SCH1119322

Ransom Demanded: True

Ransomware Strain: Avaddon

Data Encryption: True

Data Exfiltration: True

Additional Questions

General Information

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Avaddon Ransomware Group.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Telstra business customer information and Mobile phone numbers.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Order fulfillment system.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Telstra business customer information and Mobile phone numbers.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was True.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge