
University of North Carolina at Chapel Hill Company Cyber Security Posture
unc.eduCarolinaโs vibrant people and programs attest to the Universityโs long-standing place among leaders in higher education since it was chartered in 1789 and opened its doors for students in 1795 as the nationโs first public university. Situated in the beautiful college town of Chapel Hill, N.C., UNC has earned a reputation as one of the best universities in the world. Carolina prides itself on a strong, diverse student body, academic opportunities not found anywhere else, and a value unmatched by any public university in the nation. UNC-Chapel Hill's LinkedIn comments guidelines: Thank you for liking the LinkedIn page of the University of North Carolina at Chapel Hill. This page highlights information about the people and programs at Carolina. Consistent with UNC-Chapel Hillโs Policy on Prohibited Discrimination, Harassment and Related Misconduct, and the North Carolina Campus Free Speech Act, we encourage your comments and opinions as they relate to our posts. This page is actively monitored for relevance. Carolina reserves the right to remove any comments that are not related to the particular post, make unsupported accusations, contain ad-hominem attacks, use obscene language or images, are blatant spam, contain advertisements, or contain inappropriate personal information or sensitive information. Repeated violation of these guidelines or behavior that substantially disrupts the maintenance of this page could result in a user being blocked from the page. Thanks for keeping the page enjoyable for everyone. Go Tar Heels!
UNCCH Company Details
university-of-north-carolina-at-chapel-hill
19627 employees
384196.0
611
Higher Education
unc.edu
299
UNI_1430455
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

University of North Carolina at Chapel Hill Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
University of North Carolina at Chapel Hill Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
University of North Carolina at Chapel Hill | Data Leak | 85 | 3 | 12/2017 | UNI19245323 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: UNC Health Care suffered a data breach incident that exposed 24,000 patients' information in December 2017. The exposed information includes names, addresses, phone numbers, employment status, employer names, birth dates, and Social Security numbers. The affected patients were offered free credit monitoring services for one year. | |||||||
University of North Carolina at Chapel Hill | Data Leak | 85 | 3 | 11/2019 | UNI222723423 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: An estimated 3716 people were told by the university of north carolina at chapel hill school of medicine that their information had been the target of a cyberattack. which found that some workers were duped by a phishing scam and that their email accounts may have been compromised. UNC only mentions that they first confirmed the incident on September 13, 2019, but does not specify when they originally learned of it. Patients' names, dates of birth, and demographic information including residences, health insurance information, health information, Social Security numbers, financial account information, and/or credit card information were all possible components of the PII/PHI. |
University of North Carolina at Chapel Hill Company Subsidiaries

Carolinaโs vibrant people and programs attest to the Universityโs long-standing place among leaders in higher education since it was chartered in 1789 and opened its doors for students in 1795 as the nationโs first public university. Situated in the beautiful college town of Chapel Hill, N.C., UNC has earned a reputation as one of the best universities in the world. Carolina prides itself on a strong, diverse student body, academic opportunities not found anywhere else, and a value unmatched by any public university in the nation. UNC-Chapel Hill's LinkedIn comments guidelines: Thank you for liking the LinkedIn page of the University of North Carolina at Chapel Hill. This page highlights information about the people and programs at Carolina. Consistent with UNC-Chapel Hillโs Policy on Prohibited Discrimination, Harassment and Related Misconduct, and the North Carolina Campus Free Speech Act, we encourage your comments and opinions as they relate to our posts. This page is actively monitored for relevance. Carolina reserves the right to remove any comments that are not related to the particular post, make unsupported accusations, contain ad-hominem attacks, use obscene language or images, are blatant spam, contain advertisements, or contain inappropriate personal information or sensitive information. Repeated violation of these guidelines or behavior that substantially disrupts the maintenance of this page could result in a user being blocked from the page. Thanks for keeping the page enjoyable for everyone. Go Tar Heels!
Access Data Using Our API

Get company history
.png)
UNCCH Cyber Security News
The Top 10 Best Colleges in Durham for Tech Enthusiasts in 2024
Explore the top 10 best colleges in Durham, NC for tech enthusiasts in 2024. Learn about programs, faculty, and unique opportunities at eachย ...
AHA podcast: Critical Condition โ Cybersecurity in Rural Hospitals with Microsoft, Part 2
Discuss the urgent need for stronger defenses, the role of technology leaders to combat cyberattacks and Microsoft's strategies for long-term resilience.
UALRโs cybersecurity graduate certificate program seeing payoff with high school students
Three years after the University of Arkansas at Little Rock enrolled its first cohort of teachers in a graduate certificate program forย ...
Women defend against hackers in exchange program
The program โis a wonderful and practical opportunity for the female students from both universities to learn, experience and discussย ...
The Top 10 Best Colleges in Raleigh for Tech Enthusiasts in 2025
Fill this form to download every syllabus from Nucamp. And learn about Nucamp's Bootcamps and why aspiring developers choose us. Your First andย ...
UNCW to Expand Maritime Cybersecurity Program
UNCW to Expand Maritime Cybersecurity Program ยท Seahawks will help develop national standards and train future workforce to protect America'sย ...
UNC tech chief to take CIO role at Appalachian State
University of Buffalo names U. Nebraska CIO as next tech chief. Heath Tuttle is departing his role with the University of Nebraska to serve asย ...
SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology
SAFECOM, the Cybersecurity and Infrastructure Security Agency's (CISA) premier public safety communications advisory body, is comprised of public safetyย ...
NC student data compromised in breach, NC and PowerSchool say
Data from the North Carolina's student and teacher information system โ containing personal and private information about the state'sย ...

UNCCH Similar Companies

University of Waterloo
University of Waterloo is a leader in innovation that drives economic and social prosperity for Canada and the world. We are home to a renowned talent pipeline, game-changing research and technology, and unmatched entrepreneurial culture, that together create solutions to tackle todayโs and tomorrow

Georgia State University
Georgia State is an urban public research university and national model for student success in Atlanta, the cultural and economic center of the Southeast. The largest university in the state and one of the largest in the nation, Georgia State provides its faculty and more than 51,000 students with u

University of Central Florida
Founded in 1963 to provide talent for Central Florida and the growing U.S. space program, UCF has been making an impact on the state, the nation โ and outer space โ ever since. With 13 colleges and more than 230 degree programs, your passion lies at one of our campus locations designed to help you

UNSW
The University of New South Wales (UNSW) is one of Australia's leading research and teaching universities. Established in 1949, UNSW has expanded rapidly and now has more than 52,000 students, including more than 14,000 international students from over 130 different countries. UNSW offers more tha

School of Visual Arts
School of Visual Arts has been a leader in the education of artists, designers, and creative professionals for more than seven decades. With a faculty of distinguished working professionals, a dynamic curriculum, and an emphasis on critical thinking, SVA is a catalyst for innovation and social respo

Washington State University
Washington State University is a nationally recognized land-grant research university, founded in Pullman in 1890. WSUโs statewide system includes campuses in Pullman, Spokane, Everett, Tri-Cities and Vancouver, with extension and research offices in every county of the state, and a nationally ranke

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
UNCCH CyberSecurity History Information
How many cyber incidents has UNCCH faced?
Total Incidents: According to Rankiteo, UNCCH has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at UNCCH?
Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak.
Incident Details
Can you provide details on each incident?

Incident : Phishing
Title: Phishing Attack on University of North Carolina at Chapel Hill School of Medicine
Description: An estimated 3716 people were told by the University of North Carolina at Chapel Hill School of Medicine that their information had been the target of a cyberattack, which found that some workers were duped by a phishing scam and that their email accounts may have been compromised. UNC only mentions that they first confirmed the incident on September 13, 2019, but does not specify when they originally learned of it. Patients' names, dates of birth, and demographic information including residences, health insurance information, health information, Social Security numbers, financial account information, and/or credit card information were all possible components of the PII/PHI.
Date Publicly Disclosed: 2019-09-13
Type: Phishing
Attack Vector: Phishing Email
Vulnerability Exploited: Human Error

Incident : Data Breach
Title: UNC Health Care Data Breach
Description: UNC Health Care suffered a data breach incident that exposed 24,000 patients' information in December 2017. The exposed information includes names, addresses, phone numbers, employment status, employer names, birth dates, and Social Security numbers. The affected patients were offered free credit monitoring services for one year.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email.
Impact of the Incidents
What was the impact of each incident?

Incident : Phishing UNI222723423
Data Compromised: Patients' names, Dates of birth, Demographic information, Health insurance information, Health information, Social Security numbers, Financial account information, Credit card information

Incident : Data Breach UNI19245323
Data Compromised: names, addresses, phone numbers, employment status, employer names, birth dates, Social Security numbers
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are PII, PHI, names, addresses, phone numbers, employment status, employer names, birth dates and Social Security numbers.
Which entities were affected by each incident?

Incident : Phishing UNI222723423
Entity Type: Educational Institution
Industry: Education
Location: Chapel Hill, North Carolina
Customers Affected: 3716

Incident : Data Breach UNI19245323
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 24000
Data Breach Information
What type of data was compromised in each breach?

Incident : Phishing UNI222723423
Type of Data Compromised: PII, PHI
Number of Records Exposed: 3716
Sensitivity of Data: High
Personally Identifiable Information: Patients' names, Dates of birth, Demographic information, Health insurance information, Health information, Social Security numbers, Financial account information, Credit card information

Incident : Data Breach UNI19245323
Type of Data Compromised: names, addresses, phone numbers, employment status, employer names, birth dates, Social Security numbers
Number of Records Exposed: 24000
Sensitivity of Data: High
Personally Identifiable Information: True
References
Where can I find more information about each incident?

Incident : Phishing UNI222723423
Source: University of North Carolina at Chapel Hill School of Medicine
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: University of North Carolina at Chapel Hill School of Medicine.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Phishing UNI222723423
Entry Point: Phishing Email
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Phishing UNI222723423
Root Causes: Human Error
Additional Questions
Incident Details
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-09-13.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Patients' names, Dates of birth, Demographic information, Health insurance information, Health information, Social Security numbers, Financial account information, Credit card information, names, addresses, phone numbers, employment status, employer names, birth dates and Social Security numbers.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patients' names, Dates of birth, Demographic information, Health insurance information, Health information, Social Security numbers, Financial account information, Credit card information, names, addresses, phone numbers, employment status, employer names, birth dates and Social Security numbers.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 617.0.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is University of North Carolina at Chapel Hill School of Medicine.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing Email.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
