Town of Collierville Company Cyber Security Posture

colliervilletn.gov

Collierville, Tennessee is strategically located in the Southeast corner of Shelby County and is considered the premier location for business, lifestyle and access in the Memphis MSA and Mid-South region. With an emerging population closing in on 50,000, Collierville provides access to award winning schools, safe neighborhoods with escalating home values and a low cost of living. Nestled at the crossroads of highways I-269 / US Hwy 72 / SR-385, Colliervilleโ€™s prime location allows business timely access to Memphisโ€™ quadramodal assets, the river, runway, rail and road systems, which provide overnight connections to 152 key US markets and the world via FedEx.

TC Company Details

Linkedin ID:

town-of-collierville

Employees number:

204 employees

Number of followers:

2185.0

NAICS:

922

Industry Type:

Government Administration

Homepage:

colliervilletn.gov

IP Addresses:

Scan still pending

Company ID:

TOW_3243943

Scan Status:

In-progress

AI scoreTC Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Town of Collierville Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

Town of Collierville Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Town of ColliervilleRansomware75207/2019TOW232071022Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The computer systems of Town of Collierville were attacked by ransomware by Ryuk ransomware virus The attack blocked its access to some files and limited its functionality for some areas such as permits, public records requests, and business services. However, the townโ€™s Information Technology staff worked hard to minimize impacts and restore its system's functionality and even isolated and shut down all impacted servers .

Town of Collierville Company Subsidiaries

SubsidiaryImage

Collierville, Tennessee is strategically located in the Southeast corner of Shelby County and is considered the premier location for business, lifestyle and access in the Memphis MSA and Mid-South region. With an emerging population closing in on 50,000, Collierville provides access to award winning schools, safe neighborhoods with escalating home values and a low cost of living. Nestled at the crossroads of highways I-269 / US Hwy 72 / SR-385, Colliervilleโ€™s prime location allows business timely access to Memphisโ€™ quadramodal assets, the river, runway, rail and road systems, which provide overnight connections to 152 key US markets and the world via FedEx.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=town-of-collierville' -H 'apikey: YOUR_API_KEY_HERE'
newsone

TC Cyber Security News

2022-10-11T07:00:00.000Z
Collierville elections: Meet the 2 candidates running for Position Two alderman

Incumbent Billy Patton looks for reelection as Position Two Alderman for the Nov. 8,. "I love Collierville, I want to be a partย ...

2019-09-24T07:00:00.000Z
'Bluff City Law' gives Memphis prime time to shine | The 901

The authentic Memphis scenery helps set apart the new locally filmed NBC legal drama "Bluff City Law."

similarCompanies

TC Similar Companies

Oslo kommune

Med ca. 50 000 ansatte er Oslo kommune en av Norges stโˆšโˆrste arbeidsplasser. Vi utvikler hovedstaden og leverer tjenester og tilbud til innbyggerne i Norges stโˆšโˆrste by. Oslo vokser, og du kan bidra til โˆšโ€ข gjโˆšโˆre Oslo til en god by โˆšโ€ข bo i โ€šร„รฌ ogsโˆšโ€ข i framtiden. Alt om jobb og karrieremuligheter i

Comunidad de Madrid

Si necesitas informaciรณn general y especializada sobre los servicios pรบblicos madrileรฑos puedes llamar al telรฉfono de Atenciรณn al Ciudadano 012. En la Comunidad de Madrid estamos encantados de recibir comentarios y favorecer el diรกlogo, por eso te proponemos unas normas bรกsicas de participaciรณn:

State of California

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all โ€” including those who have historically been left out. We are doing the work to make our state a place for every Cali

City of Los Angeles

The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

General Directorate of Land Registry and Cadastre

The General Directorate of Land Registry and Cadastre (Tapu ve Kadastro Genel Mรผdรผrlรผgรผ) refers to the legislation regarding land registry and Cadastre in Turkey. Duties of General Directorate of Land Registry and Cadastre TO KEEP AND UPDATE LAND REGISTRY AND CADASTRE DATA OF THE COUNTRY UNDER

Agencia de Recaudaciโˆšโ‰ฅn y Control Aduanero

La Administraciโˆšโ‰ฅn Federal de Ingresos Pโˆšโˆซblicos es el ente encargado de ejecutar las polโˆšโ‰ ticas impulsadas por el Poder Ejecutivo Nacional en materia tributaria, aduanera y de recaudaciโˆšโ‰ฅn de los recursos de la seguridad social. Este organismo creado en el aโˆšยฑo 1997 (Decreto 618/1997) estโˆšยฐ inte

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

TC CyberSecurity History Information

How many cyber incidents has TC faced?

Total Incidents: According to Rankiteo, TC has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at TC?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

How does TC detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Isolated and shut down all impacted servers and recovery measures with Restored system's functionality.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Ransomware Attack on Town of Collierville

Description: The computer systems of Town of Collierville were attacked by Ryuk ransomware, blocking access to some files and limiting functionality for areas such as permits, public records requests, and business services.

Type: Ransomware

Motivation: Financial gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware TOW232071022

Systems Affected: permits, public records requests, business services

Operational Impact: Limited functionality for some areas

Which entities were affected by each incident?

Incident : Ransomware TOW232071022

Entity Type: Government

Industry: Local Government

Location: Collierville, TN

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware TOW232071022

Containment Measures: Isolated and shut down all impacted servers

Recovery Measures: Restored system's functionality

Data Breach Information

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Isolated and shut down all impacted servers.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware TOW232071022

Ransomware Strain: Ryuk

How does the company recover data encrypted by ransomware?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restored system's functionality.

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were permits, public records requests, business services.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolated and shut down all impacted servers.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge