
SOUTHEASTERN COUNCIL ON ALCOHOLISM AND DRUG DEPENDENCE INC Company Cyber Security Posture
http://scadd.orgSoutheastern Council on Alcoholism and Drug Dependence, Inc. (SCADD) provides alcohol and substance abuse treatment.
SCADDI Company Details
southeastern-council-on-alcoholism-and-drug-dependence-inc
21 employees
25.0
62
Hospitals and Health Care
http://scadd.org
Scan still pending
SOU_2781293
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

SOUTHEASTERN COUNCIL ON ALCOHOLISM AND DRUG DEPENDENCE INC Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
SOUTHEASTERN COUNCIL ON ALCOHOLISM AND DRUG DEPENDENCE INC Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
SOUTHEASTERN COUNCIL ON ALCOHOLISM AND DRUG DEPENDENCE INC | Ransomware | 100 | 4 | 02/2019 | SOU035301022 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Southeastern Council on Alcoholism and Drug Dependence (SCADD) suffered a ransomware attack that compromised the personally identifiable information of more than 25,000 patients. The information like Names, addresses, Social Security numbers, and medical records of 25,148 patients was impacted as a result of the incident. SCADD immediately began an investigation to determine the nature and scope of the event and informed the impacted individuals. |
SOUTHEASTERN COUNCIL ON ALCOHOLISM AND DRUG DEPENDENCE INC Company Subsidiaries

Southeastern Council on Alcoholism and Drug Dependence, Inc. (SCADD) provides alcohol and substance abuse treatment.
Access Data Using Our API

Get company history
.png)
SCADDI Cyber Security News
Chinaโs Cybersecurity Regulator Summons Nvidia Over Chip-Security Issue - WSJ
China's cybersecurity regulator has summoned Nvidia to discuss security risks of AI chips sold in China. The Cyberspace Administration of Chinaย ...
Analysis: Why Palo Alto Networks Is The Apple Of The Cybersecurity Industry
It's not clear why acquiring CyberArk would be any different. The $25 billion price tag for the identity security vendor came as a shock to someย ...
I'm a cybersecurity CEO who advises over 9,000 agencies and Sam Altman is wrong that the AI fraud crisis is comingโitโs already here
Sam Altman recently warned that AI-powered fraud is coming โvery soon,โ and it will break the systems we rely on to verify identity.
Palo Alto Networks investigating ransomware threat related to SharePoint exploitation
Researchers said an unidentified hacker demanded a ransom after an intrusion linked to the SharePoint flaw.
Cybersecurity professional provides insight into St. Paul cyberattack
โ St. Paul is under a state of emergency as local, state and federal agencies coordinate a response to a cyberattack that began on Friday. Whileย ...
Army secretary directs West Point to rescind appointment of Biden-era cybersecurity director
The Secretary of the Army on Wednesday directed the U.S. Military Academy at West Point to review its hiring practices.
Cybersecurity report probes Supt. Walters' TV history: 'We may never know what actually happened'
A newly released cybersecurity report was conducted to support the investigation from law enforcement, by performing a forensic examinationย ...
AI Threats Raise Demand for Cybersecurity Products That Donโt Exist (Yet)
Artificial intelligence that handles complex tasks with minimal human oversight, also known as an agent, is creating a bevy of securityย ...
Getting a Cybersecurity Vibe Check on Vibe Coding
Vibe coding, the act of using natural language to instruct large language models (LLMs) to generate code, is on the rise.

SCADDI Similar Companies

IHH HEALTHCARE MALAYSIA
IHH Healthcare Malaysia is one of the largest private healthcare providers in Malaysia, with approximately 3,000 beds. Our healthcare network comprises 11 Pantai Hospitals, four Gleneagles Hospitals, Prince Court Medical Centre and Timberland Medical Centre, and is complemented by ancillary service

Home Instead UK
Here at Home Instead, our mission is to expand the world's capacity to care. Across the globe we care for thousands of older adults, helping them live well at home for longer. In the UK, weโรรดre reaching more older people than ever with an expansive network of 240 independently owned and operated

Universitรยคtsklinikum Mรยผnster
Universitรยคtsmedizin Mรยผnster Das Universitรยคtsklinikum Mรยผnster steht fรยผr Spitzenmedizin in der deutschen Krankenhauslandschaft und gehรยถrt bundesweit zu den erfolgreichsten Maximalversorgern. Wir gestalten die Zukunft der Medizin zum Wohl unserer Patient*innen รขโฌโ durch Spitzenforschung, exzellen

Cardinal Health
Cardinal Health is a distributor of pharmaceuticals, a global manufacturer and distributor of medical and laboratory products, and a provider of performance and data solutions for healthcare facilities. With more than 50 years in business, operations in more than 30 countries and approximately 48,00

Ochsner Health
Ochsner Health is the leading nonprofit healthcare provider in the Gulf South, delivering expert care at its 46 hospitals and more than 370 health and urgent care centers. For 13 consecutive years, U.S. News & World Report has recognized Ochsner as the No. 1 hospital in Louisiana. Additionally, Ochs

Primary Health Care Limited
Primary Health Care has a new name, we are Healius. For the past few decades, weโve brought healthcare within the reach of millions of people across Australia, in the belief that everyone deserves affordable and accessible health services. A belief that for patients, what we deliver is essential; y

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
SCADDI CyberSecurity History Information
How many cyber incidents has SCADDI faced?
Total Incidents: According to Rankiteo, SCADDI has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at SCADDI?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
How does SCADDI detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Informed the impacted individuals.
Incident Details
Can you provide details on each incident?

Incident : Ransomware Attack
Title: SCADD Ransomware Attack
Description: Southeastern Council on Alcoholism and Drug Dependence (SCADD) suffered a ransomware attack that compromised the personally identifiable information of more than 25,000 patients.
Type: Ransomware Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware Attack SOU035301022
Data Compromised: Names, addresses, Social Security numbers, medical records
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, addresses, Social Security numbers and medical records.
Which entities were affected by each incident?

Incident : Ransomware Attack SOU035301022
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 25,148 patients
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware Attack SOU035301022
Communication Strategy: Informed the impacted individuals
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware Attack SOU035301022
Type of Data Compromised: Names, addresses, Social Security numbers, medical records
Number of Records Exposed: 25,148
Sensitivity of Data: High
Personally Identifiable Information: Yes
Investigation Status
What is the current status of the investigation for each incident?

Incident : Ransomware Attack SOU035301022
Investigation Status: Immediately began an investigation to determine the nature and scope of the event
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Informed the impacted individuals.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, addresses, Social Security numbers and medical records.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, addresses, Social Security numbers and medical records.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 25.1K.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Immediately began an investigation to determine the nature and scope of the event.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
