
Brown County Company Cyber Security Posture
browncountywi.govPlease see Website
Brown County Company Details
brown-county
1299 employees
3913
922
Government Administration
browncountywi.gov
Scan still pending
BRO_1605874
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Brown County Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Brown County Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Brown County | Ransomware | 100 | 6 | 12/2021 | BRO2111101122 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Brown County's computer system was down for an extended stretch after it was targeted in a ransomware attack. The countyโs information technology department received a notification that an external agency had set up malware to activate and/or extract data from the county computer system. After that Brown County immediately shut down the computer system, and hired an external firm to investigate. |
Brown County Company Subsidiaries

Please see Website
Access Data Using Our API

Get company history
.png)
Brown County Cyber Security News
SD opens bids in state-funded $7 million cybersecurity effort to protect local governments
By: John Hult - February 3, 2025 3:30 pm ยท South Dakota wants to hire a company to review local governments' ยท The request for proposals was announcedย ...
Cellcom cyber incident should be wakeup call for other companies, expert says
Cyber experts say the incident at Howard, Wisconsin-based Cellcom should be a wakeup call for other companies to take extra cyber security precautions.
Judge Sonja N. Brown Honored with Justice Robert Benham Award
Judge Brown began her legal career as a Paralegal/Contracts Administrator before being promoted to Staff Counsel at Convergent Media Systems Corporation inย ...
Cybersecurity expert: Hackers leaked data in Cobb County cyberattack
None
Harrison County BOE reports โcybersecurity incidentโ
BRIDGEPORT, W.Va (WDTV) - The Harrison County Board of Education reported a 'cybersecurity incident' that occurred last Saturday.
'Cybersecurity incident' blamed for Albemarle County internet outage
That crash has hit multiple Google Cloud customers, including Spotify, Discord, Snapchat and UPS. Although work is being done to repair service,ย ...
Criminal investigation underway into โcybersecurity incidentโ inside Fort Bend County Libraries
KPRC 2 reported on the Fort Bend County Libraries system experiencing a โcybersecurity incidentโ resulting in a shutdown of nearly all computers in its system.
Carroll and Rossville schools targeted in cyber attacks
According to a letter from PowerSchool's CEO, Hardeep Gulati, โโฆ on December 28, PowerSchool become (sic) aware of a potential cybersecurityย ...
Fort Bend County Libraries system faces website outage after โcybersecurity incidentโ
The Fort Bend County Libraries system experienced a "cybersecurity incident" that caused a website outage, according to a library news release.

Brown County Similar Companies

State of Minnesota
Minnesota State Government is the third largest employer in the state of Minnesota, employing over 50,000 diverse and talented employees in more than 100 state agencies, boards, commissions, colleges, and universities. Our workplaces can be found across the state in 86 out of 87 Minnesota counties a

Gouvernement du Quรฉbec โ Carriรจres
Travailler dans la fonction publique du Quรฉbec, c'est plus qu'une carriรจre! Rรฉparti(e)s dans une vingtaine de ministรจres et une soixantaine d'organismes ร travers le Quรฉbec, tous les gestes posรฉs par les employรฉ(e)s de la fonction publique faรงonnent lโavenir de la sociรฉtรฉ et contribuent ร amรฉliorer

City of Los Angeles
The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

Nav
Nav er en viktig del av sikkerhetsnettet i velferdsstaten. Vi skal bidra til at flere kommer i arbeid og fรฆrre gรฅr pรฅ stรธnad, og samtidig sรธrge for at de som trenger det er sikra inntekt og รธkonomisk trygghet gjennom rett pengestรธtte til rett tid. For รฅ lรธse dette samfunnsoppdraget forvalter Nav om

County of Santa Clara
The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro

European Commission
The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Brown County CyberSecurity History Information
How many cyber incidents has Brown County faced?
Total Incidents: According to Rankiteo, Brown County has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Brown County?
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
How does Brown County detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with external firm and containment measures with system shutdown.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Ransomware Attack on Brown County
Description: Brown County's computer system was down for an extended stretch after it was targeted in a ransomware attack. The countyโs information technology department received a notification that an external agency had set up malware to activate and/or extract data from the county computer system. After that Brown County immediately shut down the computer system, and hired an external firm to investigate.
Type: Ransomware
Attack Vector: Malware
Threat Actor: External agency
Motivation: Data extraction and ransom
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware BRO2111101122
Systems Affected: County computer system
Downtime: Extended stretch
Operational Impact: System shutdown
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware BRO2111101122
Third Party Assistance: External firm
Containment Measures: System shutdown
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through External firm.
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware BRO2111101122
Data Exfiltration: Data extraction
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by system shutdown.
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware BRO2111101122
Data Exfiltration: Data extraction
Investigation Status
What is the current status of the investigation for each incident?

Incident : Ransomware BRO2111101122
Investigation Status: Ongoing
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External firm.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an External agency.
Impact of the Incidents
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was County computer system.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was External firm.
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was System shutdown.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
