
Thomas More University of Applied Sciences Company Cyber Security Posture
thomasmore.beโโโโโโโโโThomas More is the largest university of applied sciences in Flanders, Belgium, with more than 21 000 students and a range of bachelorโs degree, short bachelorโs degree and postgraduate programmes taught in both English and Dutch. The English-taught programmes attract students from more than 72 different nationalities, giving the campuses and programmes a vibrant international character. As a university of applied sciences, students get the best in hands-on education, working with international companies on projects and internships and learning from teachers who are experts in their field. As part of the KU Leuven association, Thomas More participates in a variety of research projects and upholds a high educational standard.
TUAS Company Details
thomas-more-hogeschool
2566 employees
61249
611
Higher Education
thomasmore.be
Scan still pending
THO_2226391
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Thomas More University of Applied Sciences Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Thomas More University of Applied Sciences Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
thomas-more-hogeschool | Cyber Attack | 25 | 1 | 09/2023 | THO103924923 | Link | |
Rankiteo Explanation : Attack without any consequencesDescription: The Antwerp, Mechelen, and Kempen campuses of the Thomas More University of Applied Sciences were targets of a cyberattack. As a result of this attack, the computer systems are overwhelmed, but no data was stolen, and the students were hardly inconvenienced at all. Thomas More is going to call the police and complain. period the company's systems were down for a period, the students were largely unaffected. It was discovered that the school's security system operated effectively, preventing any hacking attempts and enabling a speedy return of all equipment to service. |
Thomas More University of Applied Sciences Company Subsidiaries

โโโโโโโโโThomas More is the largest university of applied sciences in Flanders, Belgium, with more than 21 000 students and a range of bachelorโs degree, short bachelorโs degree and postgraduate programmes taught in both English and Dutch. The English-taught programmes attract students from more than 72 different nationalities, giving the campuses and programmes a vibrant international character. As a university of applied sciences, students get the best in hands-on education, working with international companies on projects and internships and learning from teachers who are experts in their field. As part of the KU Leuven association, Thomas More participates in a variety of research projects and upholds a high educational standard.
Access Data Using Our API

Get company history
.png)
TUAS Cyber Security News
Degree in applied cyber analytics is helping UTSA build a cyber workforce
UTSA has been a trailblazer in the fields of AI, cyber, computing and data science. Its School of Data Science, established in 2018, is onlyย ...
Christina Lynch - Support Engineer
Related Videos ยท Tourism Careers at the Armada Hotel - Careers at Armada Hotel ยท Chef Ryan O'Sullivan - Hells Kitchen Winner - Chef - Winner of Hells Kitchenย ...
Penn College cybersecurity grad serves the nation
The Pennsylvania College of Technology alumnus supports national security by mitigating cyber risks for the US military.
Jennie Masterson - Enterprise Support Advisor
Related Videos ยท Tourism Careers at the Armada Hotel - Careers at Armada Hotel ยท Chef Ryan O'Sullivan - Hells Kitchen Winner - Chef - Winner of Hells Kitchenย ...
St. Maryโs Alumni Association celebrates Distinguished Faculty
Ayad Barsoum, Ph.D., Program Director and Associate Professor of Computer Science ... Recent accomplishments: Barsoum has dedicated a lot of timeย ...
$3.5 million NSF grant to fund 24 cybersecurity scholarships
To attract more students into the cybersecurity field, the National Science Foundation's CyberCorps Scholarship for Service (SFS) programย ...
Event Recap: 16th Annual Mountain Lion Research Day
UCCS earns top two spot, tenth straight Military Friendly Gold ranking. April 25, 2025 ยท UCCS to take on Fort Carson in esports tournament. April 22, 2025 ยท Getย ...
UST Sweetens the Deal: Now Offers 300 Students Free Fall Tuition for Associates Degrees
UST announced 300 open seats for FREE fall tuition for its three Associates' degrees in Cybersecurity, Electronic Technology and Networkย ...
Forewarned partnering with IU-led OmniSOC to promote critical cybersecurity tool
OmniSOC and Forewarned Inc. have created a new reseller partnership for the promotion and support of STINGAR v2.

TUAS Similar Companies

University of Rochester
The University of Rochester is a private research university located in Rochester, New York. Our campuses are home to more than 6,500 undergraduates and nearly 5,500 graduate students who come from across the United States and around the world to pursue their academic goals. We offer bachelor's, mas

School of Hard Knocks
The School of Hard Knocks (also referred to as the University of Life or University of Hard Knocks) is an idiomatic phrase meaning the (sometimes painful) education one gets from life's usually negative experiences, often contrasted with formal education. It is a phrase which is most typically use

The University of Queensland
For more than a century, The University of Queensland (UQ) has maintained a global reputation for delivering knowledge leadership for a better world. The most prestigious and widely recognised rankings of world universities consistently place UQ among the world's top universities. UQ has also wo

Northwestern University
Northwestern is one of the nationโs premier research universities, combining innovative teaching and pioneering research in a highly collaborative, multidisciplinary, and diverse environment. Northwestern provides both students and faculty exceptional opportunities for intellectual, personal, and pr

University of Louisville
The University of Louisville is a state supported research university located in Kentucky's largest metropolitan area. It was a municipally supported public institution for many decades prior to joining the university system in 1970. The University has three campuses. The 287-acre Belknap Campus is

The Open University
The Open University is an expert in flexible higher education that fits around your working life. We donโt make you choose between a degree and a salary โ more than 76% of our students are in full or part time work, while 86% FTSE 100 companies have funded staff on OU courses. Employers includ

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
TUAS CyberSecurity History Information
How many cyber incidents has TUAS faced?
Total Incidents: According to Rankiteo, TUAS has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at TUAS?
Incident Types: The types of cybersecurity incidents that have occurred incident Cyber Attack.
How does TUAS detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with Yes and remediation measures with Speedy return of all equipment to service.
Incident Details
Can you provide details on each incident?

Incident : Cyberattack
Title: Cyberattack on Thomas More University of Applied Sciences
Description: The Antwerp, Mechelen, and Kempen campuses of the Thomas More University of Applied Sciences were targets of a cyberattack. As a result of this attack, the computer systems were overwhelmed, but no data was stolen, and the students were hardly inconvenienced at all. The school's security system operated effectively, preventing any hacking attempts and enabling a speedy return of all equipment to service.
Type: Cyberattack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Impact of the Incidents
What was the impact of each incident?

Incident : Cyberattack THO103924923
Data Compromised: None
Systems Affected: Computer systems
Downtime: Period of downtime
Operational Impact: Minimal
Which entities were affected by each incident?

Incident : Cyberattack THO103924923
Entity Type: Educational Institution
Industry: Education
Location: Antwerp, Mechelen, Kempen
Response to the Incidents
What measures were taken in response to each incident?

Incident : Cyberattack THO103924923
Law Enforcement Notified: Yes
Remediation Measures: Speedy return of all equipment to service
Data Breach Information
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Speedy return of all equipment to service.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was None.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Computer systems.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was None.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
