Company Details
adaptoregon
179
577
62
adaptoregon.org
0
ADA_1359154
In-progress


Adapt Integrated Health Care Company CyberSecurity Posture
adaptoregon.orgAt Adapt Integrated Health Care, we don’t just serve communities, we strengthen them. Since 1971, we’ve grown into one of Oregon’s leading providers of primary care, behavioral health, and addiction recovery services, dedicated to whole-person wellness and patient-centered care. Our team is at the core of our mission. We cultivate a workplace that values collaboration, professional growth, and work-life balance. With competitive pay, comprehensive benefits, and career advancement opportunities, Adapt is a place where you can build a meaningful career while making a lasting impact in the communities we serve. We believe in transparency, innovation, and continuous learning. Whether you're delivering care on the front lines or providing essential support behind the scenes, you'll be part of a team that values your contributions and invests in your success.
Company Details
adaptoregon
179
577
62
adaptoregon.org
0
ADA_1359154
In-progress
Between 700 and 749

AIHC Global Score (TPRM)XXXX

Description: Adapt Integrated Health Care Reports Third-Party Data Security Incident Adapt Integrated Health Care disclosed a data security incident involving TriZetto, a third-party vendor for its electronic medical record system provider, OCHIN. The breach was discovered on December 10, 2025, when OCHIN notified Adapt that an unauthorized individual had accessed one of TriZetto’s systems. TriZetto acted to halt the unauthorized activity and secure its systems. While Adapt’s internal systems were not directly breached, the incident may have exposed sensitive patient information. Not all patients were affected, and there is currently no evidence that the data has been misused. Potentially exposed data includes: - Names - Social Security numbers - Dates of birth - Contact information - Health-related and insurance details Adapt is collaborating with OCHIN to strengthen security measures and review its own processes to prevent future incidents. TriZetto plans to begin sending individual notification letters to affected patients in February 2026, with support from its vendor, Kroll, which will provide identity theft protection services, call center assistance, and credit monitoring enrollment instructions. For further details, patients may contact TriZetto’s dedicated call center at (844) 572-2724 or reach out to Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789.


No incidents recorded for Adapt Integrated Health Care in 2026.
No incidents recorded for Adapt Integrated Health Care in 2026.
No incidents recorded for Adapt Integrated Health Care in 2026.
AIHC cyber incidents detection timeline including parent company and subsidiaries

At Adapt Integrated Health Care, we don’t just serve communities, we strengthen them. Since 1971, we’ve grown into one of Oregon’s leading providers of primary care, behavioral health, and addiction recovery services, dedicated to whole-person wellness and patient-centered care. Our team is at the core of our mission. We cultivate a workplace that values collaboration, professional growth, and work-life balance. With competitive pay, comprehensive benefits, and career advancement opportunities, Adapt is a place where you can build a meaningful career while making a lasting impact in the communities we serve. We believe in transparency, innovation, and continuous learning. Whether you're delivering care on the front lines or providing essential support behind the scenes, you'll be part of a team that values your contributions and invests in your success.


Abbott is a global healthcare leader that helps people live more fully at all stages of life. Our portfolio of life-changing technologies spans the spectrum of healthcare, with leading businesses and products in diagnostics, medical devices, nutritional and branded generic medicines. Our 114,000 col

A world-leading multinational healthcare provider, IHH believes that making a difference starts with our aspiration to Care. For Good. Our team of 70,000 people commit to deliver greater good to our patients, people, the public and our planet, as we live our purpose each day to touch lives and tr
Aurora Health Care is proud to be a part of Advocate Health, the third-largest nonprofit integrated health system in the U.S. Advocate Health is the third-largest nonprofit, integrated health system in the United States, created from the combination of Advocate Aurora Health and Atrium Health. Prov

Atrium Health, part of Advocate Health, is redefining how, when and where care is delivered. We are rethinking methods of care delivery to reach more people and bringing human kindness to every step of their health journey. Our dedication to elevating health care for every individual, every teammate

King Faisal Specialist Hospital and Research Centre (KFSH&RC) is a 2415 -bed tertiary/quaternary care hospital with facilities in Riyadh, Jeddah & Madinah in the Kingdom of Saudi Arabia. offering Established in 1970 on land donated by the late King Faisal Bin Abdulaziz, in the capital city of Riya

HCA Healthcare is dedicated to giving people a healthier tomorrow. As one of the nation’s leading providers of healthcare services, HCA Healthcare is comprised of 188 hospitals and 2,400+ sites of care in 20 states and the United Kingdom. In addition to hospitals, sites of care include surgery cen
Sutter Health is a not-for-profit, people-centered healthcare system providing comprehensive care throughout California. Sutter Health is committed to innovative, high-quality patient care and community partnerships, and innovative, high-quality patient care. Today, Sutter Health is pursuing a bold
Whether you are searching for your next career opportunity or looking for care for yourself or a family member, you’ll find what you need at Scripps. Founded in 1924 by philanthropist Ellen Browning Scripps, Scripps is a non-profit integrated health care delivery system based in San Diego, Calif. W

Welcome to the official LinkedIn page for McKesson Corporation. We're an impact-driven healthcare organization dedicated to “Advancing Health Outcomes For All.” As a global healthcare company, we touch virtually every aspect of health. Our leaders empower our people to lead with a growth mindset an
.png)
Discover 12 sophisticated smart home automation ideas for luxury living. Explore design-forward concepts for lighting, security, climate,...
The cybersecurity market is undergoing rapid expansion, propelled by an escalating wave of cyber threats that challenge organizations...
Artificial intelligence (AI) is shifting from a promising tool to a central pillar of modern healthcare. With the NHS now trialling...
As we wrap up another year and get ready for 2026 to begin, it is once again time for everyone's favorite annual tradition of Health IT...
The NHS is undergoing significant digital transformation, driven by the ambitions set out in the government's 10 Year Health Plan (10YHP).
How can organizations navigate the cybersecurity paradox—getting ahead of the threats introduced by AI while also harnessing its powerful...
Construction of the new Marshall University Institute of Cyber Security is underway in fall 2025. Architecture firm Perkins Eastman designed...
The proliferation of Internet of Medical Things (IoMT) devices has created cybersecurity challenges that requiring advanced threat detection...
The Executive Cybersecurity Roundtable, themed “Defend, Adapt, Thrive: Cyber Resilience in the Age of Intelligent Threats,” convened today.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Adapt Integrated Health Care is https://adaptoregon.org/.
According to Rankiteo, Adapt Integrated Health Care’s AI-generated cybersecurity score is 701, reflecting their Moderate security posture.
According to Rankiteo, Adapt Integrated Health Care currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Adapt Integrated Health Care has been affected by a supply chain cyber incident involving TriZetto Healthcare Products, with the incident ID TRIOCHADA1768955835.
According to Rankiteo, Adapt Integrated Health Care is not certified under SOC 2 Type 1.
According to Rankiteo, Adapt Integrated Health Care does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Adapt Integrated Health Care is not listed as GDPR compliant.
According to Rankiteo, Adapt Integrated Health Care does not currently maintain PCI DSS compliance.
According to Rankiteo, Adapt Integrated Health Care is not compliant with HIPAA regulations.
According to Rankiteo,Adapt Integrated Health Care is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Adapt Integrated Health Care operates primarily in the Hospitals and Health Care industry.
Adapt Integrated Health Care employs approximately 179 people worldwide.
Adapt Integrated Health Care presently has no subsidiaries across any sectors.
Adapt Integrated Health Care’s official LinkedIn profile has approximately 577 followers.
Adapt Integrated Health Care is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Adapt Integrated Health Care does not have a profile on Crunchbase.
Yes, Adapt Integrated Health Care maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/adaptoregon.
As of January 25, 2026, Rankiteo reports that Adapt Integrated Health Care has experienced 1 cybersecurity incidents.
Adapt Integrated Health Care has an estimated 31,618 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with kroll (identity theft protection services, call center assistance, credit monitoring), and containment measures with trizetto acted to halt the unauthorized activity and secure its systems, and remediation measures with strengthening security measures, reviewing processes, and communication strategy with individual notification letters to affected patients beginning february 2026..
Title: Adapt Integrated Health Care Third-Party Data Security Incident
Description: Adapt Integrated Health Care disclosed a data security incident involving TriZetto, a third-party vendor for its electronic medical record system provider, OCHIN. The breach was discovered when OCHIN notified Adapt that an unauthorized individual had accessed one of TriZetto’s systems. TriZetto acted to halt the unauthorized activity and secure its systems. While Adapt’s internal systems were not directly breached, the incident may have exposed sensitive patient information.
Date Detected: 2025-12-10
Type: Data Breach
Attack Vector: Third-Party Vendor Compromise
Threat Actor: Unauthorized Individual
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Sensitive patient information
Systems Affected: TriZetto’s systems (third-party vendor)
Identity Theft Risk: Yes
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Dates Of Birth, Contact Information, Health-Related Details, Insurance Details and .

Entity Name: Adapt Integrated Health Care
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: Not all patients (subset of patients)

Entity Name: TriZetto
Entity Type: Third-Party Vendor
Industry: Healthcare IT

Entity Name: OCHIN
Entity Type: Electronic Medical Record System Provider
Industry: Healthcare IT

Third Party Assistance: Kroll (identity theft protection services, call center assistance, credit monitoring)
Containment Measures: TriZetto acted to halt the unauthorized activity and secure its systems
Remediation Measures: Strengthening security measures, reviewing processes
Communication Strategy: Individual notification letters to affected patients beginning February 2026
Third-Party Assistance: The company involves third-party assistance in incident response through Kroll (identity theft protection services, call center assistance, credit monitoring).

Type of Data Compromised: Names, Social security numbers, Dates of birth, Contact information, Health-related details, Insurance details
Sensitivity of Data: High (Personally Identifiable Information and Protected Health Information)
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Strengthening security measures, reviewing processes.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by trizetto acted to halt the unauthorized activity and secure its systems.

Source: Adapt Integrated Health Care Disclosure
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Adapt Integrated Health Care Disclosure.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Individual notification letters to affected patients beginning February 2026.

Customer Advisories: Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789 for further details.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions and at (314) 802-6789 for further details..
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Kroll (identity theft protection services, call center assistance, credit monitoring).
Last Attacking Group: The attacking group in the last incident was an Unauthorized Individual.
Most Recent Incident Detected: The most recent incident detected was on 2025-12-10.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive patient information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll (identity theft protection services, call center assistance, credit monitoring).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was TriZetto acted to halt the unauthorized activity and secure its systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive patient information.
Most Recent Source: The most recent source of information about an incident is Adapt Integrated Health Care Disclosure.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions and at (314) 802-6789 for further details.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.