UAMS - University of Arkansas for Medical Sciences Company Cyber Security Posture

uamshealth.com

UAMS is the stateโ€™s only comprehensive academic health center, with colleges of Medicine, Nursing, Pharmacy, Health Professions and Public Health; a graduate school; a hospital; a northwest Arkansas regional campus; a statewide network of regional centers; and seven institutes: the Winthrop P. Rockefeller Cancer Institute, the Jackson T. Stephens Spine & Neurosciences Institute, the Myeloma Institute, the Harvey & Bernice Jones Eye Institute, the Psychiatric Research Institute, the Donald W. Reynolds Institute on Aging and the Translational Research Institute. It is the only adult Level 1 trauma center in the state. UAMS has 2,890 students and 782 medical residents. It is the stateโ€™s largest public employer with more than 10,000 employees, including about 1,000 physicians and other professionals who provide care to patients at UAMS, Arkansas Childrenโ€™s Hospital, the VA Medical Center and UAMS regional centers throughout the state. Visit www.uams.edu or www.uamshealth.com, or find us on Facebook.

U-UAMS Company Details

Linkedin ID:

uams

Employees number:

9426 employees

Number of followers:

42826.0

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

uamshealth.com

IP Addresses:

Scan still pending

Company ID:

UAM_2553012

Scan Status:

In-progress

AI scoreU-UAMS Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreU-UAMS Global Score
blurone
Ailogo

UAMS - University of Arkansas for Medical Sciences Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

UAMS - University of Arkansas for Medical Sciences Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
UAMS - University of Arkansas for Medical SciencesBreach80401/2022UAM03724422Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: University of Arkansas for Medical Sciences suffered a data breach after a former employee sent emails from her UAMS email to her personal Gmail account. The email included excel spreadsheets containing personal information, internal billing compliance auditing purposes and/or billing statements, dates of service, insurance type, claim information for billing purposes and medical record numbers of 518 patients. UAMS investigated the incident and unable the access of the employee.

UAMS - University of Arkansas for Medical Sciences Company Subsidiaries

SubsidiaryImage

UAMS is the stateโ€™s only comprehensive academic health center, with colleges of Medicine, Nursing, Pharmacy, Health Professions and Public Health; a graduate school; a hospital; a northwest Arkansas regional campus; a statewide network of regional centers; and seven institutes: the Winthrop P. Rockefeller Cancer Institute, the Jackson T. Stephens Spine & Neurosciences Institute, the Myeloma Institute, the Harvey & Bernice Jones Eye Institute, the Psychiatric Research Institute, the Donald W. Reynolds Institute on Aging and the Translational Research Institute. It is the only adult Level 1 trauma center in the state. UAMS has 2,890 students and 782 medical residents. It is the stateโ€™s largest public employer with more than 10,000 employees, including about 1,000 physicians and other professionals who provide care to patients at UAMS, Arkansas Childrenโ€™s Hospital, the VA Medical Center and UAMS regional centers throughout the state. Visit www.uams.edu or www.uamshealth.com, or find us on Facebook.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=uams' -H 'apikey: YOUR_API_KEY_HERE'
newsone

U-UAMS Cyber Security News

2024-11-04T08:00:00.000Z
UAMS Earns โ€˜Most Wiredโ€™ Recognition from CHIME for Use of Technology

The Digital Health Most Wired program strives to elevate the health and health care of communities around the world through the optimal use ofย ...

2025-01-13T08:00:00.000Z
As Cyberattacks Surge, Arkansas Hospitals Struggle to Keep IT Defenses Intact

Hospitals in Arkansas and beyond face a two-pronged threat from cybercriminals these days: As attacks keep increasing, the health care industryย ...

2025-01-29T08:00:00.000Z
UAMS poised to receive over $10 million for state-wide telehealth and broadband expansion

The University of Arkansas for Medical Sciences has been recommended for more than $10 million in funding to support healthcare-relatedย ...

2024-10-17T07:00:00.000Z
Going All In

A unique opportunity this summer helped Duplechain further explore intriguing options while gaining invaluable clinical and lab experience.

2025-01-30T08:00:00.000Z
UAMS recommended for $10.7 million in federal broadband funds

The University of Arkansas for Medical Sciences (UAMS) has been recommended for $10.7 million in funding through the Digital Equity Competitive Grant Program.

2025-05-31T07:00:00.000Z
UAMS no longer expecting $10.7M telemedicine grant from program targeted by Trump as unconstitutional

The University of Arkansas for Medical Sciences has notified its partners on the project that it no longer expects to receive the money.

2023-02-15T08:00:00.000Z
2023 Arkansas Money & Politics Tech Leaders

When it comes to economic development in the technology sector, Arkansas is setting itself apart as the place to be.

2024-04-08T07:00:00.000Z
Nearly 150 Arkansas girls attend Girls of Promise Conference

LITTLE ROCK โ€” The Women's Foundation of Arkansas (WFA), in partnership with Acxiom Corporation, hosted the Girls of Promiseยฎ conference atย ...

2023-01-25T08:00:00.000Z
UA System ban TikTok from devices, WIFI networks

People who manage TikTok accounts affiliated with a university of one of its units were asked to make the accounts inactive by the end of theย ...

similarCompanies

U-UAMS Similar Companies

Duke University Health System

As a world-class academic and health care system, Duke Health strives to transform medicine and health locally and globally through innovative scientific research, rapid translation of breakthrough discoveries, educating future clinical and scientific leaders, advocating and practicing evidence-base

Zuellig Pharma

Zuellig Pharma is a leading integrated healthcare solutions company in Asia with experience spanning over a century in the region. Partnering with multinational pharmaceutical manufacturers, governments, healthcare providers, and professionals, we broaden access to pharmaceutical and healthcare prod

UMass Memorial Health

UMass Memorial Health is the health and wellness partner of the people of Central Massachusetts. Through pain and pandemics, our commitment to our communities never wanes. We use knowledge and innovation to create breakthrough medicine, to create jobs, and to make life better for those we serve. We

ELSAN, groupe leader de lรขโ‚ฌโ„ขhospitalisation privรƒยฉe en France, compte aujourdรขโ‚ฌโ„ขhui plus de 28 000 collaborateurs et 7500 mรƒยฉdecins libรƒยฉraux qui exercent dans les 212 รƒยฉtablissements et centres du groupe. Ils prennent en charge plus de 4,8 millions de patients par an. Notre mission : offrir รƒย  chac

Baylor University Medical Center has a rich history which began with its founding as the Texas Baptist Memorial Sanitarium in 1903. Here are a few of the many recognitions earned this year thanks to outstanding efforts by employees and physicians. โ€ข Baylor Institute for Rehabilitation ranked

Ardent Health

Ardent Health is a leading provider of healthcare in communities across the country. With a focus on consumer-friendly processes and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent owns an

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

U-UAMS CyberSecurity History Information

How many cyber incidents has U-UAMS faced?

Total Incidents: According to Rankiteo, U-UAMS has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at U-UAMS?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does U-UAMS detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Disabling the employee's access.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Breach at University of Arkansas for Medical Sciences

Description: University of Arkansas for Medical Sciences suffered a data breach after a former employee sent emails from her UAMS email to her personal Gmail account. The email included excel spreadsheets containing personal information, internal billing compliance auditing purposes and/or billing statements, dates of service, insurance type, claim information for billing purposes and medical record numbers of 518 patients.

Type: Data Breach

Attack Vector: Email

Vulnerability Exploited: Unauthorized Data Transfer

Threat Actor: Former Employee

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach UAM03724422

Data Compromised: Personal Information, Billing Compliance Auditing Data, Billing Statements, Dates of Service, Insurance Type, Claim Information, Medical Record Numbers

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Billing Compliance Auditing Data, Billing Statements, Dates of Service, Insurance Type, Claim Information and Medical Record Numbers.

Which entities were affected by each incident?

Incident : Data Breach UAM03724422

Entity Type: Medical Institution

Industry: Healthcare

Location: Arkansas, USA

Customers Affected: 518

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach UAM03724422

Containment Measures: Disabling the employee's access

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach UAM03724422

Type of Data Compromised: Personal Information, Billing Compliance Auditing Data, Billing Statements, Dates of Service, Insurance Type, Claim Information, Medical Record Numbers

Number of Records Exposed: 518

Sensitivity of Data: High

Data Exfiltration: True

File Types Exposed: Excel Spreadsheets

Personally Identifiable Information: True

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Disabling the employee's access.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach UAM03724422

Investigation Status: Completed

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach UAM03724422

Root Causes: Unauthorized Data Transfer by Former Employee

Corrective Actions: Disabling Employee Access

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Disabling Employee Access.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Former Employee.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, Billing Compliance Auditing Data, Billing Statements, Dates of Service, Insurance Type, Claim Information and Medical Record Numbers.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disabling the employee's access.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Information, Billing Compliance Auditing Data, Billing Statements, Dates of Service, Insurance Type, Claim Information and Medical Record Numbers.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 518.0.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge