Tieto Company Cyber Security Posture

tietoevry.com

Tieto aims to capture the significant opportunities of the data-driven world and turn them into lifelong value for people, business and society. We aim to be customersโ€™ first choice for business renewal by combining our software and services capabilities with a strong drive for co-innovation and ecosystems. Headquartered in Finland, Tieto has around 15,000 experts in close to 20 countries. Tietoโ€™s turnover is approximately EUR 1.5 billion and shares listed on NASDAQ in Helsinki and Stockholm. www.tieto.com

Tieto Company Details

Linkedin ID:

tieto

Employees number:

6277 employees

Number of followers:

133099.0

NAICS:

none

Industry Type:

Information Technology & Services

Homepage:

tietoevry.com

IP Addresses:

Scan still pending

Company ID:

TIE_1363832

Scan Status:

In-progress

AI scoreTieto Risk Score (AI oriented)

Between 200 and 800

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Tieto Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 800

Tieto Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
TietoevryRansomware10058/2025TIE722080425Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Tietoevry, a leading European IT services and software company, has been affected by the Akira ransomware attack. The attack, which started in mid-July 2025, exploited a zero-day vulnerability in SonicWall SSL VPN devices. This led to unauthorized access and subsequent encryption of critical data. The ransomware group, Akira, is known for dismantling backups to hinder recovery efforts, causing significant disruption to Tietoevry's operations.

Tieto Company Subsidiaries

SubsidiaryImage

Tieto aims to capture the significant opportunities of the data-driven world and turn them into lifelong value for people, business and society. We aim to be customersโ€™ first choice for business renewal by combining our software and services capabilities with a strong drive for co-innovation and ecosystems. Headquartered in Finland, Tieto has around 15,000 experts in close to 20 countries. Tietoโ€™s turnover is approximately EUR 1.5 billion and shares listed on NASDAQ in Helsinki and Stockholm. www.tieto.com

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=tieto' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Tieto Cyber Security News

2025-07-16T14:32:56.000Z
Tietoevry Earns CyberVadis Silver for Cybersecurity Excellence

Tietoevry demonstrates robust controls to ensure personal and sensitive data is handled with transparency and in compliance with global privacyย ...

2024-10-23T07:00:00.000Z
Why organizations should understand the NIS2 Directive

NIS2 impacts critical sectors, but all companies should be aware of its ripple effect. Learn why company-wide cybersecurity training isย ...

2024-10-25T07:00:00.000Z
How to prevent massive data breaches of personal data?

Why is it that there are so many major hacks in which highly sensitive personal data is stolen on a massive scale?

2024-01-22T08:00:00.000Z
Ransomware Hit on Tietoevry Causes IT Outages Across Sweden

A ransomware attack that hit a data center run by Finnish IT software and services firm Tietoevry has led to widespread outages across Sweden.

2024-05-30T10:29:14.000Z
Sweden's Riksbank Turns to Police Following Cyber-Attack On Tietoevry Data Center

(Bloomberg) -- Sweden's central bank has filed a police report after some of its IT systems were rendered inaccessible by a ransomware attack that has crippledย ...

2024-05-30T07:00:00.000Z
OpenAI has stopped five attempts to misuse its AI for 'deceptive activity'

The San Francisco-based firm's report is the latest to stir safety concerns about the potential misuse of the gen AI technology, which canย ...

2024-01-23T08:00:00.000Z
Russian Hackers Suspected of Sweden Cyber Attack

Online services at some Swedish government agencies and shops have been disrupted in a ransomware attack believed to have been carried out by aย ...

2024-01-21T08:00:00.000Z
Tietoevry ransomware attack causes outages for Swedish firms, cities

Finnish IT services and enterprise cloud hosting provider Tietoevry has suffered an Akira ransomware attack impacting cloud hosting customers inย ...

2024-05-31T07:00:00.000Z
Tietoevry's CEO dismisses harsh allegations - "I have not denied any cybersecurity investment"

Kimmo Alkio, CEO of IT service company Tietoevry, completely dismisses the claims made by sources from Svenska Dagbladet that the companyย ...

similarCompanies

Tieto Similar Companies

Capita IT Professional Services

Our IT professional services deliver expertise in effective business change, facilitated by technology. This means building on our experience and working closely with our clients to deliver positive business outcomes. We provide end to end services in: - cyber security - business change and

Akka Technologies

AKKA is a European leader in engineering consulting and R&D services. Our comprehensive portfolio of digital solutions combined with our expertise in engineering, uniquely positions us to support our clients by leveraging the power of connected data to accelerate innovation and drive the future of s

Thoughtworks

Thoughtworks is a pioneering global technology consultancy, leading the charge in custom software development and technology innovation. We empower ambitious businesses to thrive in a constantly evolving world. We integrate the best of strategy, design, and software engineering to provide our client

IT Six Global Services

IT Six Global Services is a global technology and outsourcing company committed to deliver innovation through software services. With partners in the US, Germany, Switzerland, Norway, England and the Netherlands, IT Six has become one of the largest software houses in the region, known for the quali

Huawei Enterprise

Huawei Enterprise Business Group (EBG) is committed to bring digital to every organization for a fully connected, intelligent world, including government and public sectors, financial services, energy, transportation, and manufacturing, and other sectors. Huawei focus on ICT infrastructure and utili

RICOH Company Limited

Ricoh is a leading provider of integrated digital services and print and imaging solutions designed to support digital transformation of workplaces and optimize business performance. Headquartered in Tokyo, Ricohโ€™s global operation reaches customers in approximately 200 countries and regions, suppo

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Tieto CyberSecurity History Information

How many cyber incidents has Tieto faced?

Total Incidents: According to Rankiteo, Tieto has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Tieto?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

How does Tieto detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with FBI and CISA and containment measures with Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong, and unique.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Akira Ransomware Attacks via SonicWall SSL VPN Zero-Day

Description: Akira ransomware attacks utilizing a suspected zero-day vulnerability in SonicWall SSL VPN devices observed starting mid-July 2025.

Date Detected: mid-July 2025

Type: Ransomware

Attack Vector: Suspected zero-day vulnerability in SonicWall SSL VPN devices

Vulnerability Exploited: Zero-day vulnerability in SonicWall SSL VPN

Threat Actor: Akira

Motivation: Financial gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through SonicWall SSL VPN devices.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware TIE722080425

Systems Affected: Windows, Linux

Which entities were affected by each incident?

Incident : Ransomware TIE722080425

Entity Type: Educational Institution

Industry: Education

Incident : Ransomware TIE722080425

Entity Type: Corporation

Industry: Automotive

Incident : Ransomware TIE722080425

Entity Type: Corporation

Industry: IT Services

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware TIE722080425

Law Enforcement Notified: FBI and CISA

Containment Measures: Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong, and unique

Data Breach Information

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong and and unique.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware TIE722080425

Ransomware Strain: Akira

Data Encryption: True

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Ransomware TIE722080425

Recommendations: Implement stronger network defenses, Implement multifactor authentication

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement stronger network defenses, Implement multifactor authentication.

References

Where can I find more information about each incident?

Incident : Ransomware TIE722080425

Source: The Hacker News

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Hacker News.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Ransomware TIE722080425

Entry Point: SonicWall SSL VPN devices

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Ransomware TIE722080425

Root Causes: Suspected zero-day vulnerability in SonicWall SSL VPN devices

Corrective Actions: Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong, and unique

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong, and unique.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Akira.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on mid-July 2025.

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Windows, Linux.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Enforce multi-factor authentication (MFA), Delete inactive and unused firewall accounts, Ensure passwords are fresh, strong and and unique.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement stronger network defenses, Implement multifactor authentication.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is The Hacker News.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an SonicWall SSL VPN devices.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge