University of Cincinnati Academic Health Center Company Cyber Security Posture

uc.edu

University of Cincinnati Academic Health Centerโ€”comprising the four health colleges (Allied Health Sciences, Medicine, Nursing and Pharmacy) and closely affiliated with UC Health, Cincinnati Childrenโ€™s Hospital Medical Center, Cincinnati Department of Veterans Affairs Medical Center and Shriners Hospitals for Children-Cincinnatiโ€”is a major and vital part of the University of Cincinnati.

UCAHC Company Details

Linkedin ID:

university-of-cincinnati-academic-health-center

Employees number:

71 employees

Number of followers:

588.0

NAICS:

611

Industry Type:

Higher Education

Homepage:

uc.edu

IP Addresses:

Scan still pending

Company ID:

UNI_2018440

Scan Status:

In-progress

AI scoreUCAHC Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

University of Cincinnati Academic Health Center Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

University of Cincinnati Academic Health Center Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
University of Cincinnati Academic Health CenterBreach60408/2019UNI22110423Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: University of Cincinnati Health (UC Health) suffered from a security breach that saw the email accounts of multiple employees accessed by an unauthorized individual. An analysis of the compromised email accounts revealed they contained patientsโ€™ names, birth dates, medical record numbers, and some clinical information. A forensic analysis of the UC Health email system was unable to establish whether the attackers opened or copied any emails or email attachments. UC Health enhanced email security and re-educated employees to help them identify phishing and other malicious emails.

University of Cincinnati Academic Health Center Company Subsidiaries

SubsidiaryImage

University of Cincinnati Academic Health Centerโ€”comprising the four health colleges (Allied Health Sciences, Medicine, Nursing and Pharmacy) and closely affiliated with UC Health, Cincinnati Childrenโ€™s Hospital Medical Center, Cincinnati Department of Veterans Affairs Medical Center and Shriners Hospitals for Children-Cincinnatiโ€”is a major and vital part of the University of Cincinnati.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=university-of-cincinnati-academic-health-center' -H 'apikey: YOUR_API_KEY_HERE'
newsone

UCAHC Cyber Security News

2025-06-30T14:37:51.000Z
What can you do with a public health degree? Career paths and salaries

Discover public health careers, salaries and degree paths. Explore jobs in epidemiology, health education, global health and more at UC.

2025-06-03T22:37:11.000Z
Center for Cyber Strategy and Policy

The Center for Cyber Strategy and Policy (CCSP) seeks to advance the study of cybersecurity through a social science (and humanities) perspective grounded,ย ...

2025-05-23T07:00:00.000Z
UC Cybersecurity experts weigh in on the threat of hacking groups

When a ransomware attack on Kettering Health made national headlines, local outlets turned to University of Cincinnati's cyber experts forย ...

2025-06-02T07:00:00.000Z
Exploring careers in AI and Machine Learning for University of Cincinnati students

As a student at the University of Cincinnati, you're perfectly positioned to dive into the transformative fields of artificial intelligence (AI)ย ...

2025-05-20T07:00:00.000Z
Cyberattack forces outage at Kettering Health, scam callers try to get patients' credit card info

KETTERING, Ohio โ€” A "cybersecurity incident" has resulted in a system-wide technology outage and an increase in reported scam calls,ย ...

2025-05-22T07:00:00.000Z
Cybersecurity attack targets Ohio hospitals

Kettering Health officials said an outage led to a cybersecurity attack on their systems. Health officials said while they are still taking in emergency roomย ...

2025-04-14T20:00:06.000Z
Fastest-growing careers: What jobs will be in demand?

In this guide, we'll break down the fastest-growing careers, how UC can help you gain the skills, experience and network you need to thrive in tomorrow'sย ...

2024-08-13T07:00:00.000Z
OCRI uses game to prepare for cybersecurity incidents

The OCRI provides training to help organizations throughout Ohio prepare for and respond to cybersecurity incidents.

2025-05-24T07:00:00.000Z
Cybersecurity Experts from University of Cincinnati Warn of Rising Ransomware Attacks on Healthcare Institutions

Experts assess the rise in ransomware attacks against healthcare providers, stressing the need for cyber-resilience.

similarCompanies

UCAHC Similar Companies

Brown University

Located in historic Providence, Rhode Island and founded in 1764, Brown University is the seventh-oldest college in the United States. Brown is an independent, coeducational Ivy League institution comprising undergraduate and graduate programs, plus the Alpert Medical School, School of Public Health

University of Cincinnati

The University of Cincinnati, top 5 university for co-op, offers students a balance of educational excellence and real-world experience. Since its founding in 1819, UC has been the source of many discoveries creating positive change for society, including the first antihistamine, the first co-op edu

Auburn University

Auburn University is a comprehensive land, space and sea grant research institution blending arts and applied sciences. The university continuously changes to accommodate today's needs, while still respecting the traditions and spirit of Auburn. As we grow and change, Auburn will always continue its

University of Delaware

The University of Delaware - a state assisted, privately chartered institution - is a Land Grant, Sea Grant, Space Grant and Carnegie Research University (very high research activity). The University, with origins in 1743, was chartered by the State of Delaware in 1833. A Women's College was opened

Facultad de Ciencias Agropecuarias UNC

La actual Facultad de Ciencias Agropecuarias se creรณ el 21 de marzo de 1966 segรบn Ordenanza Nยฐ 4/66 del H.C.S. con la denominaciรณn de Instituto de Ciencias Agronรณmicas, dependiendo directamente del Rector y del Consejo Superior. Se trata de una Instituciรณn de corta vida, respecto a otras Faculta

Babol Noshirvani University of Technology

Noshirvani Institute of Technology was founded in 1970 by a great benevolent & honorable man and one of the greatest philanthropists of Iran, Late Seyed Hossein Fallah Noshirvani. The college is situated in Babol a city in Mazandaran Province in the north of Iran, 20 km south of the Caspian Sea The

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

UCAHC CyberSecurity History Information

How many cyber incidents has UCAHC faced?

Total Incidents: According to Rankiteo, UCAHC has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at UCAHC?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does UCAHC detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Enhanced email security, Re-educated employees to identify phishing and other malicious emails.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: UC Health Email Breach

Description: University of Cincinnati Health (UC Health) suffered from a security breach that saw the email accounts of multiple employees accessed by an unauthorized individual.

Type: Data Breach

Attack Vector: Email Compromise

Threat Actor: Unauthorized Individual

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach UNI22110423

Data Compromised: Patientsโ€™ names, Birth dates, Medical record numbers, Clinical information

Systems Affected: Email System

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patientsโ€™ names, Birth dates, Medical record numbers and Clinical information.

Which entities were affected by each incident?

Incident : Data Breach UNI22110423

Entity Type: Healthcare

Industry: Healthcare

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach UNI22110423

Remediation Measures: Enhanced email security, Re-educated employees to identify phishing and other malicious emails

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach UNI22110423

Type of Data Compromised: Patientsโ€™ names, Birth dates, Medical record numbers, Clinical information

Sensitivity of Data: High

Data Exfiltration: Unknown

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced email security, Re-educated employees to identify phishing and other malicious emails.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach UNI22110423

Entry Point: Email

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Unauthorized Individual.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Patientsโ€™ names, Birth dates, Medical record numbers and Clinical information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Email System.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patientsโ€™ names, Birth dates, Medical record numbers and Clinical information.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge