Company Details
university-hospitals-connor-whole-health
19,519
1,921
62
uhhospitals.org
0
UNI_3483779
In-progress


University Hospitals Connor Integrative Health Network Vendor Cyber Rating & Cyber Score
uhhospitals.orgIntegrative Medicine (IM) is an approach to healthcare that takes into account the whole person addressing the full range of physical, emotional, mental, social, spiritual, and environmental influences that affect an individual’s health. IM is informed by evidence, makes use of all appropriate therapies, and emphasizes that the patient and practitioner are partners in the healing process. At University Hospitals Connor Whole Health, we offer IM therapies that work in concert with traditional medical treatments to heal the mind, body, and spirit. Employing a personalized strategy that considers the patient’s unique circumstances, we use the most appropriate interventions from an array of scientific disciplines to heal illness and disease and help people attain optimum health.
Company Details
university-hospitals-connor-whole-health
19,519
1,921
62
uhhospitals.org
0
UNI_3483779
In-progress
Between 750 and 799

UHCIHN Global Score (TPRM)XXXX

Description: The U.S. Department of Health and Human Services reported a data breach involving University Hospital on November 5, 2021. The breach, characterized as unauthorized access/disclosure, affected 10,067 individuals whose protected health information (PHI) was compromised, including names, addresses, dates of birth, Social Security numbers, health insurance information, diagnoses, and treatment information.
Description: The Maine Office of the Attorney General reported that University Hospital experienced an insider wrongdoing incident involving a former employee who accessed patient information without authorization between January 1, 2016, and December 31, 2017. The breach was discovered on August 24, 2021, and affected a total of 9,329 individuals, with 2 residents from Maine specifically. Notification letters were sent to those affected on October 8, 2021, and identity theft protection services were offered for one year through Experian.
Description: University Hospitals Elyria Medical Center experienced a data breach incident after an employee improperly accessed the personal and medical information of nearly 300 patients. The employee had accessed the hospital’s electronic medical record system outside the worker’s normal duties. The accessed information included the names, dates of birth, medical record numbers, dates of service and diagnostic and treatment information.


No incidents recorded for University Hospitals Connor Integrative Health Network in 2026.
No incidents recorded for University Hospitals Connor Integrative Health Network in 2026.
No incidents recorded for University Hospitals Connor Integrative Health Network in 2026.
UHCIHN cyber incidents detection timeline including parent company and subsidiaries

Integrative Medicine (IM) is an approach to healthcare that takes into account the whole person addressing the full range of physical, emotional, mental, social, spiritual, and environmental influences that affect an individual’s health. IM is informed by evidence, makes use of all appropriate therapies, and emphasizes that the patient and practitioner are partners in the healing process. At University Hospitals Connor Whole Health, we offer IM therapies that work in concert with traditional medical treatments to heal the mind, body, and spirit. Employing a personalized strategy that considers the patient’s unique circumstances, we use the most appropriate interventions from an array of scientific disciplines to heal illness and disease and help people attain optimum health.

Committed to Life - We save and improve human lives with affordable, accessible, and innovative healthcare products and the highest quality in clinical care. Fresenius is a global healthcare company headquartered in Bad Homburg v. d. Höhe, Germany. In fiscal year 2024, Fresenius generated €21.5 bil

O Ministério da Saúde é o órgão do Poder Executivo Federal responsável pela organização e elaboração de planos e políticas públicas voltados para a promoção, a prevenção e a assistência à saúde dos brasileiros. É função do Ministério dispor de condições para a proteção e recuperação da saúde da pop
Sharp HealthCare is a not-for-profit health care system based in San Diego, California, with four acute care hospitals, three specialty hospitals, three medical groups and a health plan. We provide medical services in virtually all fields of medicine, including primary care, heart care, cancer, orth
Alberta Health Services (AHS) is proud to be part of Canada’s first and largest provincewide, integrated health system, responsible for delivering health services to more than 4.5 million people living in Alberta, as well as occasionally to some residents of other provinces and territories Our skil
SSM Health is a Catholic, not-for-profit, fully integrated health system dedicated to advancing innovative, sustainable, and compassionate care for patients and communities throughout the Midwest and beyond. The organization’s 40,000 team members and 13,900 providers are committed to fulfilling SSM

Sentara Health, an integrated, not-for-profit health care delivery system, celebrates more than 135 years in pursuit of its mission - "we improve health every day." Sentara is one of the largest health systems in the U.S. Mid-Atlantic and Southeast, and among the top 20 largest not-for-profit integr
For more than half a century, UCLA Health has provided the best in healthcare and the latest in medical technology to the people of Los Angeles and throughout the world. Comprised of Ronald Reagan UCLA Medical Center, UCLA Medical Center Santa Monica, Resnick Neuropsychiatric Hospital at UCLA, UCLA

At OHSU, we deliver breakthroughs for better health. We're driven by the belief that better health starts with innovations in the lab, in the classroom, at the bedside and in our communities. From cancer to Alzheimer's to cardiovascular care, we collaborate every day to identify and deliver new wa
Indiana University Health is Indiana’s largest and most comprehensive system. A unique partnership with the Indiana University School of Medicine—one of the nation’s largest medical schools—gives patients access to groundbreaking research and innovative treatments, and it offers team members acces
.png)
The winners of the 2025 Digital Health Awards have been revealed following a ceremony at Summer Schools at the University of Warwick.
Matt shared insight into the importance of having a cohesive strategy for digital and his views on cyber security – the current threat landscape, priorities...
Dietz does not recommend an entirely holistic treatment. However, she says an increasing number of her patients are choosing to complement their conventional...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of University Hospitals Connor Integrative Health Network is https://www.uhhospitals.org/ConnorWholeHealth.
According to Rankiteo, University Hospitals Connor Integrative Health Network’s AI-generated cybersecurity score is 780, reflecting their Fair security posture.
According to Rankiteo, University Hospitals Connor Integrative Health Network currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, University Hospitals Connor Integrative Health Network has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, University Hospitals Connor Integrative Health Network is not certified under SOC 2 Type 1.
According to Rankiteo, University Hospitals Connor Integrative Health Network does not hold a SOC 2 Type 2 certification.
According to Rankiteo, University Hospitals Connor Integrative Health Network is not listed as GDPR compliant.
According to Rankiteo, University Hospitals Connor Integrative Health Network does not currently maintain PCI DSS compliance.
According to Rankiteo, University Hospitals Connor Integrative Health Network is not compliant with HIPAA regulations.
According to Rankiteo,University Hospitals Connor Integrative Health Network is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
University Hospitals Connor Integrative Health Network operates primarily in the Hospitals and Health Care industry.
University Hospitals Connor Integrative Health Network employs approximately 19,519 people worldwide.
University Hospitals Connor Integrative Health Network presently has no subsidiaries across any sectors.
University Hospitals Connor Integrative Health Network’s official LinkedIn profile has approximately 1,921 followers.
University Hospitals Connor Integrative Health Network is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, University Hospitals Connor Integrative Health Network does not have a profile on Crunchbase.
Yes, University Hospitals Connor Integrative Health Network maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/university-hospitals-connor-whole-health.
As of March 30, 2026, Rankiteo reports that University Hospitals Connor Integrative Health Network has experienced 3 cybersecurity incidents.
University Hospitals Connor Integrative Health Network has an estimated 32,295 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with experian, and remediation measures with identity theft protection services, and communication strategy with notification letters..
Title: Data Breach at University Hospitals Elyria Medical Center
Description: University Hospitals Elyria Medical Center experienced a data breach incident after an employee improperly accessed the personal and medical information of nearly 300 patients. The employee had accessed the hospital’s electronic medical record system outside the worker’s normal duties. The accessed information included the names, dates of birth, medical record numbers, dates of service and diagnostic and treatment information.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Improper Access Controls
Threat Actor: Employee
Title: University Hospital Data Breach
Description: The U.S. Department of Health and Human Services reported a data breach involving University Hospital on November 5, 2021. The breach, characterized as unauthorized access/disclosure, affected 10,067 individuals whose protected health information (PHI) was compromised, including names, addresses, dates of birth, Social Security numbers, health insurance information, diagnoses, and treatment information.
Date Detected: 2021-11-05
Type: Data Breach
Attack Vector: Unauthorized Access/Disclosure
Title: Unauthorized Access to Patient Information at University Hospital
Description: A former employee accessed patient information without authorization between January 1, 2016, and December 31, 2017. The breach was discovered on August 24, 2021, affecting 9,329 individuals, including 2 residents from Maine.
Date Detected: 2021-08-24
Date Publicly Disclosed: 2021-10-08
Type: Insider Wrongdoing
Attack Vector: Unauthorized Access
Vulnerability Exploited: Insider Threat
Threat Actor: Former Employee
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Dates of birth, Medical record numbers, Dates of service, Diagnostic and treatment information

Data Compromised: Names, Addresses, Dates of birth, Social security numbers, Health insurance information, Diagnoses, Treatment information

Data Compromised: Patient Information
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Medical Record Numbers, Dates Of Service, Diagnostic And Treatment Information, , Phi, and Patient Information.

Entity Name: University Hospitals Elyria Medical Center
Entity Type: Hospital
Industry: Healthcare
Location: Elyria, Ohio
Customers Affected: Nearly 300 patients

Entity Name: University Hospital
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 10067

Entity Name: University Hospital
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 9329

Third Party Assistance: Experian
Remediation Measures: Identity Theft Protection Services
Communication Strategy: Notification Letters
Third-Party Assistance: The company involves third-party assistance in incident response through Experian.

Type of Data Compromised: Names, Dates of birth, Medical record numbers, Dates of service, Diagnostic and treatment information
Number of Records Exposed: Nearly 300
Sensitivity of Data: High
Personally Identifiable Information: NamesDates of BirthMedical Record Numbers

Type of Data Compromised: Phi
Number of Records Exposed: 10067
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesDates of BirthSocial Security Numbers

Type of Data Compromised: Patient Information
Number of Records Exposed: 9329
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Identity Theft Protection Services.

Source: U.S. Department of Health and Human Services
Date Accessed: 2021-11-05

Source: Maine Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: U.S. Department of Health and Human ServicesDate Accessed: 2021-11-05, and Source: Maine Office of the Attorney General.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification Letters.

Customer Advisories: Notification Letters
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notification Letters.

Root Causes: Insider Threat
Corrective Actions: Identity Theft Protection Services
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Identity Theft Protection Services.
Last Attacking Group: The attacking group in the last incident were an Employee and Former Employee.
Most Recent Incident Detected: The most recent incident detected was on 2021-11-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-10-08.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Medical Record Numbers, Dates of Service, Diagnostic and Treatment Information, , Names, Addresses, Dates of Birth, Social Security Numbers, Health Insurance Information, Diagnoses, Treatment Information, and Patient Information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Experian.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Treatment Information, Medical Record Numbers, Addresses, Dates of Service, Health Insurance Information, Diagnostic and Treatment Information, Diagnoses, Patient Information, Dates of Birth, Names and Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.4K.
Most Recent Source: The most recent source of information about an incident are U.S. Department of Health and Human Services and Maine Office of the Attorney General.
Most Recent Customer Advisory: The most recent customer advisory issued was an Notification Letters.
.png)
A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.