Comparison Overview

42nd Street Charity

VS

YOUTH INTENSIVE SERVICES

42nd Street Charity

87-91 Great Ancoats Street, Manchester, Greater Manchester, M4 5AG, GB
Last Update: 2026-01-22
Between 750 and 799

42nd Street supports young people aged 11-25 years with their emotional wellbeing and mental health, promoting choice and creativity. We champion young person centred approaches that demonstrate local impact and have national significance. We offer a range of individual therapeutic support and encourage and support young people to have a voice, and access opportunities to learn, develop new skills, be creative, have fun and demonstrate to themselves and others that they are able to recover, manage their mental health and wellbeing and achieve their full potential. We deliver services at our Manchester city centre base, in community venues, arts and cultural centres, and in schools and colleges to make sure our services are accessible. We also have our own dedicated creative venue The Horsfall which is an exciting new venue and programme of creative events that builds on 42nd Street’s trusted and innovative approach to improving young people’s mental health. We have taken inspiration for this project from Thomas Horsfall and his Ancoats Art Museum; a unique social and artistic experiment established in Ancoats, Manchester at the end of the 19th Century.

NAICS: 621
NAICS Definition:
Employees: 77
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

YOUTH INTENSIVE SERVICES

238 S MERIDIAN RD, YOUNGSTOWN, Ohio, 44509, US
Last Update: 2026-01-20

YOUTH INTENSIVE SERVICES is a company based out of 238 S MERIDIAN RD, YOUNGSTOWN, Ohio, United States. We care because these children deserve better. It takes a special human being to dedicate their professional career to helping troubled children. It also takes a special human being to see the potential in every one of us; especially those who don’t see it in themselves. DeWayne Thompson opened Youth Intensive Services in 2009 because he knew there was a better way to reach young people in need of mental health services. He wasn’t satisfied with the status quo and he set out to change it … for the better. The organization started modestly with a few services for area youth, but quickly expanded as opportunities – and the company’s strong reputation – grew. Thompson set out to find more people in the social services field who shared his vision, his passion and his drive, so that his company could grow and serve more and more children. And then young adults. Today Youth Intensive Services is getting permanent office space in local school buildings to treat children conveniently and confidentially. They’re seeing patients in their Youngstown office and in their families’ homes. They’re conservatively prescribing medications when needed. They’re doing family counseling, group counseling, sibling counseling. They’re offering respite, or mentoring, services to kids who need an adult role model in their life. They’re managing residential homes for teenage boys and girls who are almost out of options in their lives – and they’re turning these young people’s lives around. For the better. They’re offering vocational services for disabled adults who are seeking some independence in their lives. They’re fielding referrals as a proven-effective partner of dozens of county and state agencies within 100 miles of their Youngstown, Ohio campus.

NAICS: 621
NAICS Definition:
Employees: 49
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/42nd-street-charity.jpeg
42nd Street Charity
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/youth-intensive-services.jpeg
YOUTH INTENSIVE SERVICES
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
42nd Street Charity
100%
Compliance Rate
0/4 Standards Verified
YOUTH INTENSIVE SERVICES
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for 42nd Street Charity in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for YOUTH INTENSIVE SERVICES in 2026.

Incident History — 42nd Street Charity (X = Date, Y = Severity)

42nd Street Charity cyber incidents detection timeline including parent company and subsidiaries

Incident History — YOUTH INTENSIVE SERVICES (X = Date, Y = Severity)

YOUTH INTENSIVE SERVICES cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/42nd-street-charity.jpeg
42nd Street Charity
Incidents

No Incident

https://images.rankiteo.com/companyimages/youth-intensive-services.jpeg
YOUTH INTENSIVE SERVICES
Incidents

No Incident

FAQ

YOUTH INTENSIVE SERVICES company demonstrates a stronger AI Cybersecurity Score compared to 42nd Street Charity company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, YOUTH INTENSIVE SERVICES company has disclosed a higher number of cyber incidents compared to 42nd Street Charity company.

In the current year, YOUTH INTENSIVE SERVICES company and 42nd Street Charity company have not reported any cyber incidents.

Neither YOUTH INTENSIVE SERVICES company nor 42nd Street Charity company has reported experiencing a ransomware attack publicly.

Neither YOUTH INTENSIVE SERVICES company nor 42nd Street Charity company has reported experiencing a data breach publicly.

Neither YOUTH INTENSIVE SERVICES company nor 42nd Street Charity company has reported experiencing targeted cyberattacks publicly.

Neither 42nd Street Charity company nor YOUTH INTENSIVE SERVICES company has reported experiencing or disclosing vulnerabilities publicly.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds any compliance certifications.

Neither company holds any compliance certifications.

Neither 42nd Street Charity company nor YOUTH INTENSIVE SERVICES company has publicly disclosed detailed information about the number of their subsidiaries.

42nd Street Charity company employs more people globally than YOUTH INTENSIVE SERVICES company, reflecting its scale as a Mental Health Care.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds SOC 2 Type 1 certification.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds SOC 2 Type 2 certification.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds ISO 27001 certification.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds PCI DSS certification.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds HIPAA certification.

Neither 42nd Street Charity nor YOUTH INTENSIVE SERVICES holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H