
TriVerity Company Cyber Security Posture
triverity.comTriVerity, a Velera company, is a full-service firstโand third-party collection agency that manages early-stage delinquency, non-performing loans and charged-off loans with a comprehensive menu of collection services. Since 1990, TriVerity has worked with over 2,700 financial institutions nationwide and is a leading industry expert for financial institution collections of all loan types. TriVerityโs broad spectrum of collection resources and training programs help financial institutions manage and mitigate loan delinquency rates. For more information, go to www.TriVerity.com.
TriVerity Company Details
triverity
62 employees
1084
52
Financial Services
triverity.com
Scan still pending
TRI_2551122
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

TriVerity Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
TriVerity Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
TriVerity & The Loan Service Center | Breach | 80 | 4 | 09/2020 | TRI15386422 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: CU Collections, under Triverity, suffered a data security incident in September 2020. An unauthorized party got access to its systems and breached the information in its possession. The compromised information included names, addresses, Social Security numbers, financial account numbers, and/or driver's license numbers of its customers. It immediately took preventive measures and started investigating the incident. |
TriVerity Company Subsidiaries

TriVerity, a Velera company, is a full-service firstโand third-party collection agency that manages early-stage delinquency, non-performing loans and charged-off loans with a comprehensive menu of collection services. Since 1990, TriVerity has worked with over 2,700 financial institutions nationwide and is a leading industry expert for financial institution collections of all loan types. TriVerityโs broad spectrum of collection resources and training programs help financial institutions manage and mitigate loan delinquency rates. For more information, go to www.TriVerity.com.
Access Data Using Our API

Get company history
.png)
TriVerity Cyber Security News
Inflammatix Ships TriVerityโข Test Cartridges and Myrnaโข Instruments to the U.S. Military
"We are pleased that the JPEO-CBRND has chosen to evaluate our TriVerity Test System, including TriVerity cartridges and the Myrna instrument,ย ...

TriVerity Similar Companies

BDO Unibank
BDO is a full-service universal bank in the Philippines. It provides a complete array of industry-leading products and services including Lending (corporate and consumer), Deposit-taking, Foreign Exchange, Brokering, Trust and Investments, Credit Cards, Corporate Cash Management, and Remittances in

Allianz China Life
Allianz China Life Insurance Co., Ltd. is a joint venture life insurance company formed by Allianz SE, the German financial services conglomerate, and CITIC Trust. The company was the first European joint venture insurer in China, officially open in Shanghai on 25 January 1999. At present, Allianz C

M&T Bank
Great companies have an enduring sense of purpose. At M&T, our purpose is a simple one: make a difference in peopleโs lives and uplift the diverse communities we serve. Founded in 1856 in Buffalo, NY we are now a top 11 full-service US-based commercial bank with a retail footprint across the east co

SONAE
Sonae exists to create a lasting positive impact on businesses, people, communities and on the planet. Managing a diverse portfolio of businesses in retail, financial services, technology, investments, shopping centres and telecommunications, Sonae makes the most of its expertise and pushes itself

USAA
Since the beginning, our mission has been to provide a range of financial services to the military community and their families. Along the way, weโve also established ourselves as a destination employer for passionate people looking to serve those who are willing to give it their all. Our mission

Old Mutual
Old Mutual Limited is a listed company on the Johannesburg Stock Exchange and has secondary listings on the London, Malawi, Namibia and Zimbabwe stock exchanges. As a Pan-African financial services company, we are focused on Africa, her needs and her people. Together with you, we have educated our

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
TriVerity CyberSecurity History Information
How many cyber incidents has TriVerity faced?
Total Incidents: According to Rankiteo, TriVerity has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at TriVerity?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: CU Collections Data Breach
Description: CU Collections, under Triverity, suffered a data security incident in September 2020 where an unauthorized party got access to its systems and breached the information in its possession.
Date Detected: September 2020
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unauthorized Party
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach TRI15386422
Data Compromised: Names, Addresses, Social Security numbers, Financial account numbers, Driver's license numbers
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security numbers, Financial account numbers and Driver's license numbers.
Which entities were affected by each incident?
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach TRI15386422
Type of Data Compromised: Names, Addresses, Social Security numbers, Financial account numbers, Driver's license numbers
Sensitivity of Data: High
Personally Identifiable Information: True
Investigation Status
What is the current status of the investigation for each incident?

Incident : Data Breach TRI15386422
Investigation Status: Ongoing
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Unauthorized Party.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on September 2020.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security numbers, Financial account numbers and Driver's license numbers.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Addresses, Social Security numbers, Financial account numbers and Driver's license numbers.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
