Company Details
-tds-
3,529
10,800
517
tdsinc.com
0
TDS_1711242
In-progress

TDS® Company CyberSecurity Posture
tdsinc.comTelephone and Data Systems (TDS) provides wireless products and services; cable and wireline broadband, TV and voice services to approximately 5.5 million customers nationwide. The TDS companies share a strong commitment to customer satisfaction by offering the highest-quality services and products and excellent customer support. UScellular® UScellular, headquartered in Chicago, IL, provides a comprehensive range of wireless services and products, excellent customer support, and a high-quality network to 5 million customers nationwide. UScellular is traded on the New York Stock Exchange under USM. TDS Telecommunications Corp.® TDS Telecommunications Corp., headquartered in Madison, WI, provides high-speed Internet, phone and TV entertainment services, as well as VoIP business solutions, to customers in rural, suburban and metropolitan communities nationwide. Suttle-Straus® Suttle-Straus provides comprehensive marketing solutions including creative design, mailing, fulfillment, distribution, displays, signage, promotional products, conventional and digital printing.
Company Details
-tds-
3,529
10,800
517
tdsinc.com
0
TDS_1711242
In-progress
Between 700 and 749

TDS® Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported a data breach involving Telephone and Data Systems, Inc. on June 23, 2021. The breach occurred on January 20, 2021, due to an external system breach (hacking) affecting 99 individuals in total, including 9 residents. The compromised information included Social Security Numbers, and identity theft protection services were offered for 24 months through Experian.


No incidents recorded for TDS® in 2025.
No incidents recorded for TDS® in 2025.
No incidents recorded for TDS® in 2025.
TDS® cyber incidents detection timeline including parent company and subsidiaries

Telephone and Data Systems (TDS) provides wireless products and services; cable and wireline broadband, TV and voice services to approximately 5.5 million customers nationwide. The TDS companies share a strong commitment to customer satisfaction by offering the highest-quality services and products and excellent customer support. UScellular® UScellular, headquartered in Chicago, IL, provides a comprehensive range of wireless services and products, excellent customer support, and a high-quality network to 5 million customers nationwide. UScellular is traded on the New York Stock Exchange under USM. TDS Telecommunications Corp.® TDS Telecommunications Corp., headquartered in Madison, WI, provides high-speed Internet, phone and TV entertainment services, as well as VoIP business solutions, to customers in rural, suburban and metropolitan communities nationwide. Suttle-Straus® Suttle-Straus provides comprehensive marketing solutions including creative design, mailing, fulfillment, distribution, displays, signage, promotional products, conventional and digital printing.

We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s

Trublion historique des Télécoms, Free reste un opérateur pas comme les autres. Nous continuons de nous distinguer de nos concurrents par nos produits, par notre politique tarifaire ou encore par le ton employé avec nos abonnés. Cette différence a aussi construit la grande entreprise que nous somme
Cox Communications is committed to creating more moments of real human connection. We bring people closer to family and friends through technology that’s inspired by a culture that puts people first, and we’re always working to improve life in the communities we serve. Our world-class broadband appl
We are driving the digital transition of Italy and Brazil with innovative technologies and services because we want to contribute to accelerating the sustainable growth of the economy and society by bringing value and prosperity to people, companies and institutions. We offer diversified solutions

תכירו את השחקנים הראשיים שלנו: העובדות והעובדים. אנחנו לא עובדים עם תסריט קבוע, חושבים מחוץ לקופסא, ומייצרים ז'אנר משלנו. כש-יס קמה, בשנת 1998, הבאנו את בשורת הלווין אל עולם שידורי הטלוויזיה והיינו הראשונים להציע שידורים דיגיטליים ושירותי טלוויזיה אינטראקטיביים - כשבחירת התכנים היא בידיים של הלקוח

Safaricom is the leading provider of converged communication solutions in Kenya. In addition to providing a broad range of first-class products and services for Telephony, Broadband Internet and Financial services, Safaricom seeks to uplift the welfare of Kenyans through value-added services and sup

Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a
Orange is one of the world’s leading telecommunications operators with revenues of 40.3 billion euros in 2024 and 127,000 employees worldwide at 31 December 2024, including 71,000 employees in France. The Group has a total customer base of 291 million customers worldwide at 31 December 2024, inclu
.png)
India's Telecom Ministry has issued an order that all new smartphones sold in India must come pre-installed with a government-developed...
Proposed emergency powers aimed at protecting the State from cyber attacks by shutting down computer servers would “deter” foreign...
Lamborghini's sales and marketing chief indicated that the off-road Huracan Sterrato was only the beginning of novel supercars.
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.
Also: We did it – together! | Volunteers to help seniors | To those who cry Marxist | We must protect our forests | Ban 'steer tailing'.
Vulnerable and malicious plug-ins give threat actors the ability to compromise WordPress sites and use them as a springboard to a variety of...
ShadowCaptcha exploits 100+ WordPress sites since Aug 2025, spreading ransomware, stealers, and miners worldwide.
This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape.
Fake Windows Alerts - GoDaddy Security researchers have uncovered a sophisticated Traffic Direction System (TDS) operation.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TDS® is http://www.tdsinc.com.
According to Rankiteo, TDS®’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, TDS® currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TDS® is not certified under SOC 2 Type 1.
According to Rankiteo, TDS® does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TDS® is not listed as GDPR compliant.
According to Rankiteo, TDS® does not currently maintain PCI DSS compliance.
According to Rankiteo, TDS® is not compliant with HIPAA regulations.
According to Rankiteo,TDS® is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TDS® operates primarily in the Telecommunications industry.
TDS® employs approximately 3,529 people worldwide.
TDS® presently has no subsidiaries across any sectors.
TDS®’s official LinkedIn profile has approximately 10,800 followers.
TDS® is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, TDS® has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/telephone-and-data-systems.
Yes, TDS® maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/-tds-.
As of December 18, 2025, Rankiteo reports that TDS® has experienced 1 cybersecurity incidents.
TDS® has an estimated 9,750 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with experian, and remediation measures with identity theft protection services offered for 24 months..
Title: Data Breach at Telephone and Data Systems, Inc.
Description: The Maine Office of the Attorney General reported a data breach involving Telephone and Data Systems, Inc. on June 23, 2021. The breach occurred on January 20, 2021, due to an external system breach (hacking) affecting 99 individuals in total, including 9 residents. The compromised information included Social Security Numbers, and identity theft protection services were offered for 24 months through Experian.
Date Detected: 2021-01-20
Date Publicly Disclosed: 2021-06-23
Type: Data Breach
Attack Vector: External System Breach (Hacking)
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security numbers
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers.

Entity Name: Telephone and Data Systems, Inc.
Entity Type: Company
Industry: Telecommunications
Customers Affected: 99

Third Party Assistance: Experian.
Remediation Measures: Identity theft protection services offered for 24 months
Third-Party Assistance: The company involves third-party assistance in incident response through Experian, .

Type of Data Compromised: Social Security Numbers
Number of Records Exposed: 99
Sensitivity of Data: High
Personally Identifiable Information: Social Security Numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Identity theft protection services offered for 24 months, .

Source: Maine Office of the Attorney General
Date Accessed: 2021-06-23
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2021-06-23.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian, .
Most Recent Incident Detected: The most recent incident detected was on 2021-01-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-06-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security Numbers and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was experian, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 99.0.
Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.