Company Details
ttec
41,059
356,848
541615
ttec.com
0
TTE_2413344
In-progress


TTEC Vendor Cyber Rating & Cyber Score
ttec.comWe’re TTEC (pronounced t.tec). For over 40 years we have been obsessed with one thing: Helping the world’s best brands deliver exceptional customer experiences (CX). We're not just another BPO company. We're CX innovators, with deep understanding of what makes customers happy. We seamlessly blend human expertise with the power of AI to deliver optimized solutions across every touchpoint – from customer care and tech support to sales, collections, and trust & safety.
Company Details
ttec
41,059
356,848
541615
ttec.com
0
TTE_2413344
In-progress
Between 650 and 699

TTEC Global Score (TPRM)XXXX

Description: TTEC, a customer digital experience (CX) service, fell victim to a cyberattack on its IT systems that disrupted some of its activities. However, all operations were restored, isolating the affected equipment and taking corrective measures within five days. However, a forensic investigation remained ongoing into the possibility of a Rangnar Locker ransomware attack.
Description: The systems of TTEC were affected by ransomware attack by the Ragnar Locker group on its servers. The outage impacted the access to the network, applications and customer support. The attackers gained the access to the systems and left messages on its syetmes asking for ransom.
Description: The Maine Attorney General's Office reported a data breach involving TTEC on December 8, 2021. The breach was determined to have occurred between March 31, 2021, and September 12, 2021, affecting the personal information of 19 Maine residents, specifically their names and Social Security numbers. TTEC has offered affected individuals a complimentary one-year membership to credit monitoring and identity theft protection services.


No incidents recorded for TTEC in 2026.
No incidents recorded for TTEC in 2026.
No incidents recorded for TTEC in 2026.
TTEC cyber incidents detection timeline including parent company and subsidiaries

We’re TTEC (pronounced t.tec). For over 40 years we have been obsessed with one thing: Helping the world’s best brands deliver exceptional customer experiences (CX). We're not just another BPO company. We're CX innovators, with deep understanding of what makes customers happy. We seamlessly blend human expertise with the power of AI to deliver optimized solutions across every touchpoint – from customer care and tech support to sales, collections, and trust & safety.


iQor CXBPO™ is a trusted partner in intelligent customer experience solutions for global brands and a portfolio company of Mill Point Capital. With 47,000+ employees across 11 countries, iQor combines three decades of expertise with AI-driven innovation to optimize performance across the entire cust

TaskUs is a different breed of BPO. We are a collective of highly capable humans, who understand how to deploy technology and data to best serve your purpose. From Digital CX to Trust & Safety, AI Services, Risk + Response, Consulting, and anything in between, we consider ourselves responsible for p

Majorel has been acquired by TP allowing us to deliver even more exceptional services in more locations worldwide and on a greater scale than ever before. We deliver the most advanced, digitally-powered business services to help the world’s best brands streamline their business in meaningful and su

We’re passionate about creating customers for life by designing experiences that elevate your brand. As your full-service CX partner from strategy to execution, we blend proven performance, industry-leading expertise and the right technology that delivers real results and limitless possibilities. Wh

Offering flexible solutions for all of the UAE’s staffing needs since 2001, Transguard Group is the region’s most trusted expert in security, facilities management, cash services and white-collar staffing, and more. With an annual turnover of AED 3.2 billion in FY24/25, Transguard’s expertise is in

ResultsCX is a leading provider of transformational Customer Experience Management (CXM) solutions to 75+ global brands, including Fortune 100 and 500 companies. For 30+ years, we have been driving superior customer and business outcomes for brands across Healthcare, Media, Telecom, Fast Growth tech

We are one of the world's largest global providers of customer relationship management and business transformation outsourcing (CRM/BTO) services and industry leaders in Latin America. Our offerings have expanded beyond the realms of traditional Business Process Outsourcing (BPO) to become front-ru

We are TP Group. You’ve been calling us Teleperformance for almost 47 years. But in the AI era, the world has changed, and we had to change too to keep leading the digital business services market. We’re sharper, more modern, and even more empathetic. We are TP. Simple as that. Intelligent as alway
A global customer experience (CX) management solutions provider, Startek® delivers best-in-class omnichannel CX, digital transformation and enterprise tech services for leading brands, from Fortune 500s to fast-growing startups. Our innovation and expertise ensure CX excellence across traditional an
.png)
The Sykes Enterprises stock (ISIN: US87166B1026) no longer trades independently following its acquisition by TTEC Holdings in 2021.
Company to grow Cairo workforce to 3500 by 2029 under new MOU with ITIDA TTEC first entered Egypt in 2023 and expanded again in early 2025...
Discover how TTEC embraced transformation with Palo Alto Networks. Their unified platform secured multi-tenancy and migrated 85% of workloads to the cloud.
Barry Padarath, Minister of Public Utilities and Minister in the Office of the Prime Minister promised residents there will be no increase of water or...
T&TEC said, “a brief disruption to its online payment platforms, due to the current global IT outage, has been resolved.
THE Trinidad and Tobago Electricity Commission (TTEC) says it has resolved issues connected to the global IT disturbance reportedly caused...
Beyond the hassle and the unwanted media attention, cyberattacks can be quite costly for BPOs. Cybersecurity is a growing concern for...
Several BPO vendors have found themselves embroiled in PR firestorms and lawsuits over hacks that exposed the personal data of tens of thousands of customers...
TTEC Services Corp. will settle consolidated litigation over a 2021 data breach, according to a new filing in federal court in Colorado that...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TTEC is http://www.ttec.com/.
According to Rankiteo, TTEC’s AI-generated cybersecurity score is 681, reflecting their Weak security posture.
According to Rankiteo, TTEC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TTEC has been affected by a supply chain cyber incident involving TTEC, with the incident ID TTE16021322.
According to Rankiteo, TTEC is not certified under SOC 2 Type 1.
According to Rankiteo, TTEC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TTEC is not listed as GDPR compliant.
According to Rankiteo, TTEC does not currently maintain PCI DSS compliance.
According to Rankiteo, TTEC is not compliant with HIPAA regulations.
According to Rankiteo,TTEC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TTEC operates primarily in the Outsourcing and Offshoring Consulting industry.
TTEC employs approximately 41,059 people worldwide.
TTEC presently has no subsidiaries across any sectors.
TTEC’s official LinkedIn profile has approximately 356,848 followers.
TTEC is classified under the NAICS code 541615, which corresponds to Others.
No, TTEC does not have a profile on Crunchbase.
Yes, TTEC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ttec.
As of April 02, 2026, Rankiteo reports that TTEC has experienced 3 cybersecurity incidents.
TTEC has an estimated 1,117 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Cyber Attack and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with isolating the affected equipment, and remediation measures with taking corrective measures, and recovery measures with restoring all operations, and remediation measures with complimentary one-year membership to credit monitoring and identity theft protection services..
Title: Ransomware Attack on TTEC
Description: The systems of TTEC were affected by ransomware attack by the Ragnar Locker group on its servers. The outage impacted the access to the network, applications, and customer support. The attackers gained access to the systems and left messages on its systems asking for ransom.
Type: Ransomware
Attack Vector: Unspecified
Threat Actor: Ragnar Locker group
Motivation: Financial
Title: TTEC Cyberattack
Description: TTEC, a customer digital experience (CX) service, fell victim to a cyberattack on its IT systems that disrupted some of its activities.
Type: Cyberattack
Title: TTEC Data Breach
Description: The Maine Attorney General's Office reported a data breach involving TTEC on December 8, 2021. The breach was determined to have occurred between March 31, 2021, and September 12, 2021, affecting the personal information of 19 Maine residents, specifically their names and Social Security numbers. TTEC has offered affected individuals a complimentary one-year membership to credit monitoring and identity theft protection services.
Date Detected: 2021-12-08
Date Publicly Disclosed: 2021-12-08
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: NetworkApplicationsCustomer Support

Systems Affected: IT systems
Downtime: 5 days
Operational Impact: Disruption of some activities

Data Compromised: Names, Social security numbers
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers and .

Entity Name: TTEC
Entity Type: Company
Industry: Customer Digital Experience (CX) Service

Containment Measures: Isolating the affected equipment
Remediation Measures: Taking corrective measures
Recovery Measures: Restoring all operations

Remediation Measures: Complimentary one-year membership to credit monitoring and identity theft protection services

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 19
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Taking corrective measures, , Complimentary one-year membership to credit monitoring and identity theft protection services, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolating the affected equipment and .

Ransomware Strain: Ragnar Locker

Ransomware Strain: Rangnar Locker
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restoring all operations, .
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Attorney General's OfficeDate Accessed: 2021-12-08.

Investigation Status: Ongoing forensic investigation
Last Attacking Group: The attacking group in the last incident was an Ragnar Locker group.
Most Recent Incident Detected: The most recent incident detected was on 2021-12-08.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-12-08.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident was NetworkApplicationsCustomer Support and IT systems.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolating the affected equipment.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and Social Security numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 19.0.
Most Recent Source: The most recent source of information about an incident is Maine Attorney General's Office.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing forensic investigation.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.