Comparison Overview

SSM Health

VS

Optum

SSM Health

10101 Woodfield Ln, St Louis, 63132, US
Last Update: 2026-03-29
Between 700 and 749

SSM Health is a Catholic, not-for-profit, fully integrated health system dedicated to advancing innovative, sustainable, and compassionate care for patients and communities throughout the Midwest and beyond. The organization’s 40,000 team members and 13,900 providers are committed to fulfilling SSM Health’s Mission: “Through our exceptional health care services, we reveal the healing presence of God.” With care delivery sites in Illinois, Missouri, Oklahoma and Wisconsin, SSM Health includes hospitals, physician offices, outpatient and virtual care services, comprehensive home care and hospice services, a fully transparent pharmacy benefit company, a health insurance company and an accountable care organization. It is one of the largest employers in every community it serves. For more information, visit ssmhealth.com Visit jobs.ssmhealth.com to fulfill your calling with SSM Health. Together – We Care.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 19,512
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
2

Optum

11000 Optum Circle, Eden Prairie , MN, US, 55344
Last Update: 2026-03-25
Between 650 and 699

At Optum, we take a bold approach to solving the challenges of healthcare. We call it Healthy Optumism — the realistic yet hopeful belief that when you’re grounded in real world needs, human connection and data-driven expertise, better is always possible. We use advanced technology to connect people to insights in real time, focus on prevention, and strip away inefficiencies. We know change doesn’t happen overnight, but every success moves us closer to delivering efficient, affordable, high-quality care.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 103,600
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
3

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ssm-health-care.jpeg
SSM Health
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/optum.jpeg
Optum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
SSM Health
100%
Compliance Rate
0/4 Standards Verified
Optum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for SSM Health in 2026.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Optum in 2026.

Incident History — SSM Health (X = Date, Y = Severity)

SSM Health cyber incidents detection timeline including parent company and subsidiaries

Incident History — Optum (X = Date, Y = Severity)

Optum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ssm-health-care.jpeg
SSM Health
Incidents

Date Detected: 11/2025
Type:Cyber Attack
Blog: Blog

Date Detected: 12/2020
Type:Breach
Attack Vector: Unauthorized Access/Disclosure
Blog: Blog
https://images.rankiteo.com/companyimages/optum.jpeg
Optum
Incidents

Date Detected: 7/2024
Type:Ransomware
Blog: Blog

Date Detected: 3/2024
Type:Ransomware
Attack Vector: Ransomware
Motivation: Financial Gain
Blog: Blog

Date Detected: 2/2024
Type:Cyber Attack
Attack Vector: Vulnerabilities in IT infrastructure
Blog: Blog

FAQ

SSM Health company demonstrates a stronger AI Cybersecurity Score compared to Optum company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Optum company has faced a higher number of disclosed cyber incidents historically compared to SSM Health company.

In the current year, Optum company and SSM Health company have not reported any cyber incidents.

Optum company has confirmed experiencing a ransomware attack, while SSM Health company has not reported such incidents publicly.

Both Optum company and SSM Health company have disclosed experiencing at least one data breach.

Both Optum company and SSM Health company have reported experiencing targeted cyberattacks.

Neither SSM Health company nor Optum company has reported experiencing or disclosing vulnerabilities publicly.

Neither SSM Health nor Optum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither SSM Health company nor Optum company has publicly disclosed detailed information about the number of their subsidiaries.

Optum company employs more people globally than SSM Health company, reflecting its scale as a Hospitals and Health Care.

Neither SSM Health nor Optum holds SOC 2 Type 1 certification.

Neither SSM Health nor Optum holds SOC 2 Type 2 certification.

Neither SSM Health nor Optum holds ISO 27001 certification.

Neither SSM Health nor Optum holds PCI DSS certification.

Neither SSM Health nor Optum holds HIPAA certification.

Neither SSM Health nor Optum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X