
University of Cincinnati Academic Health Center Company Cyber Security Posture
uc.eduUniversity of Cincinnati Academic Health Centerโcomprising the four health colleges (Allied Health Sciences, Medicine, Nursing and Pharmacy) and closely affiliated with UC Health, Cincinnati Childrenโs Hospital Medical Center, Cincinnati Department of Veterans Affairs Medical Center and Shriners Hospitals for Children-Cincinnatiโis a major and vital part of the University of Cincinnati.
UCAHC Company Details
university-of-cincinnati-academic-health-center
71 employees
588.0
611
Higher Education
uc.edu
Scan still pending
UNI_2018440
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

University of Cincinnati Academic Health Center Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
University of Cincinnati Academic Health Center Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
University of Cincinnati Academic Health Center | Breach | 60 | 4 | 08/2019 | UNI22110423 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: University of Cincinnati Health (UC Health) suffered from a security breach that saw the email accounts of multiple employees accessed by an unauthorized individual. An analysis of the compromised email accounts revealed they contained patientsโ names, birth dates, medical record numbers, and some clinical information. A forensic analysis of the UC Health email system was unable to establish whether the attackers opened or copied any emails or email attachments. UC Health enhanced email security and re-educated employees to help them identify phishing and other malicious emails. |
University of Cincinnati Academic Health Center Company Subsidiaries

University of Cincinnati Academic Health Centerโcomprising the four health colleges (Allied Health Sciences, Medicine, Nursing and Pharmacy) and closely affiliated with UC Health, Cincinnati Childrenโs Hospital Medical Center, Cincinnati Department of Veterans Affairs Medical Center and Shriners Hospitals for Children-Cincinnatiโis a major and vital part of the University of Cincinnati.
Access Data Using Our API

Get company history
.png)
UCAHC Cyber Security News
What can you do with a public health degree? Career paths and salaries
Discover public health careers, salaries and degree paths. Explore jobs in epidemiology, health education, global health and more at UC.
Center for Cyber Strategy and Policy
The Center for Cyber Strategy and Policy (CCSP) seeks to advance the study of cybersecurity through a social science (and humanities) perspective grounded,ย ...
UC Cybersecurity experts weigh in on the threat of hacking groups
When a ransomware attack on Kettering Health made national headlines, local outlets turned to University of Cincinnati's cyber experts forย ...
Exploring careers in AI and Machine Learning for University of Cincinnati students
As a student at the University of Cincinnati, you're perfectly positioned to dive into the transformative fields of artificial intelligence (AI)ย ...
Cyberattack forces outage at Kettering Health, scam callers try to get patients' credit card info
KETTERING, Ohio โ A "cybersecurity incident" has resulted in a system-wide technology outage and an increase in reported scam calls,ย ...
Cybersecurity attack targets Ohio hospitals
Kettering Health officials said an outage led to a cybersecurity attack on their systems. Health officials said while they are still taking in emergency roomย ...
Fastest-growing careers: What jobs will be in demand?
In this guide, we'll break down the fastest-growing careers, how UC can help you gain the skills, experience and network you need to thrive in tomorrow'sย ...
OCRI uses game to prepare for cybersecurity incidents
The OCRI provides training to help organizations throughout Ohio prepare for and respond to cybersecurity incidents.
Cybersecurity Experts from University of Cincinnati Warn of Rising Ransomware Attacks on Healthcare Institutions
Experts assess the rise in ransomware attacks against healthcare providers, stressing the need for cyber-resilience.

UCAHC Similar Companies

Brown University
Located in historic Providence, Rhode Island and founded in 1764, Brown University is the seventh-oldest college in the United States. Brown is an independent, coeducational Ivy League institution comprising undergraduate and graduate programs, plus the Alpert Medical School, School of Public Health

University of Cincinnati
The University of Cincinnati, top 5 university for co-op, offers students a balance of educational excellence and real-world experience. Since its founding in 1819, UC has been the source of many discoveries creating positive change for society, including the first antihistamine, the first co-op edu

Auburn University
Auburn University is a comprehensive land, space and sea grant research institution blending arts and applied sciences. The university continuously changes to accommodate today's needs, while still respecting the traditions and spirit of Auburn. As we grow and change, Auburn will always continue its

University of Delaware
The University of Delaware - a state assisted, privately chartered institution - is a Land Grant, Sea Grant, Space Grant and Carnegie Research University (very high research activity). The University, with origins in 1743, was chartered by the State of Delaware in 1833. A Women's College was opened

Facultad de Ciencias Agropecuarias UNC
La actual Facultad de Ciencias Agropecuarias se creรณ el 21 de marzo de 1966 segรบn Ordenanza Nยฐ 4/66 del H.C.S. con la denominaciรณn de Instituto de Ciencias Agronรณmicas, dependiendo directamente del Rector y del Consejo Superior. Se trata de una Instituciรณn de corta vida, respecto a otras Faculta

Babol Noshirvani University of Technology
Noshirvani Institute of Technology was founded in 1970 by a great benevolent & honorable man and one of the greatest philanthropists of Iran, Late Seyed Hossein Fallah Noshirvani. The college is situated in Babol a city in Mazandaran Province in the north of Iran, 20 km south of the Caspian Sea The

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
UCAHC CyberSecurity History Information
How many cyber incidents has UCAHC faced?
Total Incidents: According to Rankiteo, UCAHC has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at UCAHC?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does UCAHC detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Enhanced email security, Re-educated employees to identify phishing and other malicious emails.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: UC Health Email Breach
Description: University of Cincinnati Health (UC Health) suffered from a security breach that saw the email accounts of multiple employees accessed by an unauthorized individual.
Type: Data Breach
Attack Vector: Email Compromise
Threat Actor: Unauthorized Individual
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach UNI22110423
Data Compromised: Patientsโ names, Birth dates, Medical record numbers, Clinical information
Systems Affected: Email System
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patientsโ names, Birth dates, Medical record numbers and Clinical information.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach UNI22110423
Remediation Measures: Enhanced email security, Re-educated employees to identify phishing and other malicious emails
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach UNI22110423
Type of Data Compromised: Patientsโ names, Birth dates, Medical record numbers, Clinical information
Sensitivity of Data: High
Data Exfiltration: Unknown
Personally Identifiable Information: Yes
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced email security, Re-educated employees to identify phishing and other malicious emails.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach UNI22110423
Entry Point: Email
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Unauthorized Individual.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Patientsโ names, Birth dates, Medical record numbers and Clinical information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Email System.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patientsโ names, Birth dates, Medical record numbers and Clinical information.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
