Company Details
brown-lisle-cummings
13
29
52
brownlislecummings.com
0
BRO_6573143
In-progress

Brown, Lisle/Cummings Company CyberSecurity Posture
brownlislecummings.comNone
Company Details
brown-lisle-cummings
13
29
52
brownlislecummings.com
0
BRO_6573143
In-progress
Between 700 and 749

Brown, Lisle/Cummings Global Score (TPRM)XXXX

Description: The New Hampshire Department of Justice reported a data breach involving Brown, Lisle/Cummings, Inc. on June 15, 2018. The breach, which occurred between April 15, 2018, and April 20, 2018, involved unauthorized access to an email account, potentially affecting the personal information of two New Hampshire residents, specifically their names and Social Security numbers.


No incidents recorded for Brown, Lisle/Cummings in 2025.
No incidents recorded for Brown, Lisle/Cummings in 2025.
No incidents recorded for Brown, Lisle/Cummings in 2025.
Brown, Lisle/Cummings cyber incidents detection timeline including parent company and subsidiaries

None


Lars Larsen Group is owned by the Brunsborg family, descendants of JYSK founder Lars Larsen. The Group owns companies within a number of business areas including furniture, interior design, restaurants and hotels, and is also an active investor in equities, funds, and real estate. The Group is to t
Imagine a world where people live healthier, more enhanced and protected lives… A world in which each organisation is a powerful influencer and responsible corporate citizen, committed to being a force for social good. As a leading innovator in healthcare, wellness, insurance, investments, financial
BDO is a full-service universal bank in the Philippines. It provides a complete array of industry-leading products and services including Lending (corporate and consumer), Deposit-taking, Foreign Exchange, Brokering, Trust and Investments, Credit Cards, Corporate Cash Management, and Remittances in

Morningstar, Inc. is a leading provider of independent investment insights in North America, Europe, Australia, and Asia. The Company offers an extensive line of products and services for individual investors, financial advisors, asset managers and owners, retirement plan providers and sponsors, ins

Founded in 1962 and a public company since 1983, Raymond James Financial, Inc. is a Florida-based diversified holding company providing financial services to individuals, corporations and municipalities through its subsidiary companies engaged primarily in investment and financial planning, in addit
The Allianz Group is one of the world's leading insurers and asset managers with more than 100 million private and corporate customers in more than 70 countries. We are proud to be the Worldwide Insurance Partner of the Olympic & Paralympic Movements from 2021 until 2028 and to be recognized as one

Barclays Investment Bank deploys financial solutions to help our clients with their funding, financing, strategic and risk management needs across sectors, markets and economies. The Investment Bank is comprised of the Investment Banking, International Corporate Banking, Global Markets and Researc
ICE (NYSE: ICE) connects people to data, technology and expertise that create opportunity and inspire innovation. For terms of use, visit www.ice.co

Welkom op de officiële LinkedIn-pagina van KBC! Bekijk onze vacatures op de tab ‘Vacatures’. KBC is een geïntegreerde bank-verzekeraar die zich hoofdzakelijk richt op particulieren en privatebankingcliënten, en op kleine en middelgrote ondernemingen. KBC heeft een leidende positie in zijn thuisma
.png)
Discover how Bitdefender and DSN Group partner to deliver enterprise-grade and cost-effective cybersecurity solutions tailored for small and...
State leadership has been working on key IT initiatives in 2025, from a digital ID project to a customer experience initiative to bolstering...
A cybersecurity “incident” affecting the City of Tigard's public safety alert system, CodeRED, may have exposed subscribers' personal...
TIGARD, Ore. — The city of Tigard revealed Tuesday that some residents' personal information, including addresses and phone numbers,...
Global IT Sector Roars Ahead: A Trillion-Dollar Surge Driven by AI, Cloud, and Cybersecurity.
The City of Long Beach has alerted its citizens about a significant cybersecurity breach affecting the emergency notification system used by...
The ADA urged HHS to withdraw a proposed update to the HIPAA Security Rule and restart the process with more input from provider groups.
Cybersecurity insurer Coalition said it will start covering certain incidents where AI and deepfakes lead to reputational harm.
As workloads shift between cloud and on-prem environments, mainframes are experiencing a resurgence—94% of organizations have repatriated...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Brown, Lisle/Cummings is http://www.brownlislecummings.com.
According to Rankiteo, Brown, Lisle/Cummings’s AI-generated cybersecurity score is 747, reflecting their Moderate security posture.
According to Rankiteo, Brown, Lisle/Cummings currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Brown, Lisle/Cummings is not certified under SOC 2 Type 1.
According to Rankiteo, Brown, Lisle/Cummings does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Brown, Lisle/Cummings is not listed as GDPR compliant.
According to Rankiteo, Brown, Lisle/Cummings does not currently maintain PCI DSS compliance.
According to Rankiteo, Brown, Lisle/Cummings is not compliant with HIPAA regulations.
According to Rankiteo,Brown, Lisle/Cummings is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Brown, Lisle/Cummings operates primarily in the Financial Services industry.
Brown, Lisle/Cummings employs approximately 13 people worldwide.
Brown, Lisle/Cummings presently has no subsidiaries across any sectors.
Brown, Lisle/Cummings’s official LinkedIn profile has approximately 29 followers.
Brown, Lisle/Cummings is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Brown, Lisle/Cummings does not have a profile on Crunchbase.
Yes, Brown, Lisle/Cummings maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brown-lisle-cummings.
As of December 10, 2025, Rankiteo reports that Brown, Lisle/Cummings has experienced 1 cybersecurity incidents.
Brown, Lisle/Cummings has an estimated 30,253 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Brown, Lisle/Cummings, Inc.
Description: Unauthorized access to an email account, potentially affecting the personal information of two New Hampshire residents, specifically their names and Social Security numbers.
Date Detected: 2018-04-20
Date Publicly Disclosed: 2018-06-15
Type: Data Breach
Attack Vector: Unauthorized Email Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers and .

Entity Name: Brown, Lisle/Cummings, Inc.
Entity Type: Company
Location: New Hampshire
Customers Affected: 2

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 2
Sensitivity of Data: High

Source: New Hampshire Department of Justice
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: New Hampshire Department of Justice.
Most Recent Incident Detected: The most recent incident detected was on 2018-04-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2018-06-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.0.
Most Recent Source: The most recent source of information about an incident is New Hampshire Department of Justice.
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.