Company Details
center-for-asian-health-equity
7
327
92312
uchicago.edu
0
CEN_2112211
In-progress

Center for Advancing Health Equity Company CyberSecurity Posture
uchicago.eduThe Center for Advancing Health Equity in Rural and Underserved Communities (CAHE-RUC) provides a central location for the comprehensive evaluation of the health issues and diverse healthcare needs of rural and underserved communities. CAHE-RUC is a partnership between the Asian Health Coalition and the Penn State College of Medicine that brings together the assets of a world class research institution and a respected non-profit organization to investigate health disparities that disproportionately affect rural and minority communities throughout the country. The Center takes a multidisciplinary, collaborative approach to addressing gaps in clinical medicine and public health through a comprehensive program for research, health education, training, community engagement, policy, and information dissemination. CAHE-RUC provides an innovative model of partnership that demonstrates how community-level coalitions bring value, community access, and deeper translational impact to academic institutions.
Company Details
center-for-asian-health-equity
7
327
92312
uchicago.edu
0
CEN_2112211
In-progress
Between 750 and 799

CAHE Global Score (TPRM)XXXX

Description: A data breach at **Nationwide Recovery Services**, a third-party debt collection agency, exposed sensitive information of **38,000 University of Chicago Medicine Medical Group patients**. The compromised data included **names, birthdates, addresses, Social Security numbers, financial records, and medical details**, though University of Chicago Medical Center patients were unaffected. The breach was discovered in **July 2023**, with officials warning affected individuals to monitor credit reports and account statements for fraudulent activity. The incident highlights the healthcare sector’s vulnerability to cyberattacks, particularly those targeting third-party vendors with access to patient data. While no direct ransomware or systemic disruption was reported, the exposure of **highly sensitive personal and financial information** poses significant risks of identity theft, financial fraud, and long-term reputational damage to both the medical group and the vendor.
Description: The Maine Office of the Attorney General reported that the University of Chicago Medical Center experienced an email security incident allowing unauthorized access to personal information between January 4, 2024, and January 30, 2024, affecting a total of 10,332 individuals. The breach was discovered on March 28, 2024, and social security numbers were among the types of compromised information.


No incidents recorded for Center for Advancing Health Equity in 2025.
No incidents recorded for Center for Advancing Health Equity in 2025.
No incidents recorded for Center for Advancing Health Equity in 2025.
CAHE cyber incidents detection timeline including parent company and subsidiaries

The Center for Advancing Health Equity in Rural and Underserved Communities (CAHE-RUC) provides a central location for the comprehensive evaluation of the health issues and diverse healthcare needs of rural and underserved communities. CAHE-RUC is a partnership between the Asian Health Coalition and the Penn State College of Medicine that brings together the assets of a world class research institution and a respected non-profit organization to investigate health disparities that disproportionately affect rural and minority communities throughout the country. The Center takes a multidisciplinary, collaborative approach to addressing gaps in clinical medicine and public health through a comprehensive program for research, health education, training, community engagement, policy, and information dissemination. CAHE-RUC provides an innovative model of partnership that demonstrates how community-level coalitions bring value, community access, and deeper translational impact to academic institutions.

.png)
Gergen Fellows fanned across the globe this past summer to learn public leadership on the job, in support of a wide range of policy issues...
Migrant and displaced populations experience a disproportionate burden of noncommunicable diseases (NCDs) and mental health conditions.
The World Health Organization and partners will raise global awareness during the 80th United Nations General Assembly (UNGA) on progress to...
EQTY 2025: Progress Under Pressure, brings together visionary leaders, sharing their collective wisdom at a critical moment in health equity to light a path...
NIH is moving toward a unified strategy that aligns our priorities and funding approaches to fulfill this commitment.
In June 2025, the World Health Organization (WHO) established the Health Inequality Monitoring (HIM) Network—a WHO-led initiative committed...
Embedding leading health equity principles across operations can help pharma companies address disparities and drive commercial success.
WHO has launched the WHO Disability Health Equity Initiative, a landmark global initiative to advance health equity for over 1.3 billion...
Cyber threats against hospitals are surging. What steps are being taken by the health-care sector to address the increasing impacts of cyber attacks?

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Center for Advancing Health Equity is https://asianhealth.uchicago.edu/.
According to Rankiteo, Center for Advancing Health Equity’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.
According to Rankiteo, Center for Advancing Health Equity currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Center for Advancing Health Equity is not certified under SOC 2 Type 1.
According to Rankiteo, Center for Advancing Health Equity does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Center for Advancing Health Equity is not listed as GDPR compliant.
According to Rankiteo, Center for Advancing Health Equity does not currently maintain PCI DSS compliance.
According to Rankiteo, Center for Advancing Health Equity is not compliant with HIPAA regulations.
According to Rankiteo,Center for Advancing Health Equity is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Center for Advancing Health Equity operates primarily in the Public Health industry.
Center for Advancing Health Equity employs approximately 7 people worldwide.
Center for Advancing Health Equity presently has no subsidiaries across any sectors.
Center for Advancing Health Equity’s official LinkedIn profile has approximately 327 followers.
Center for Advancing Health Equity is classified under the NAICS code 92312, which corresponds to Administration of Public Health Programs.
No, Center for Advancing Health Equity does not have a profile on Crunchbase.
Yes, Center for Advancing Health Equity maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/center-for-asian-health-equity.
As of November 28, 2025, Rankiteo reports that Center for Advancing Health Equity has experienced 2 cybersecurity incidents.
Center for Advancing Health Equity has an estimated 280 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with advisory to affected patients to monitor credit reports and account statements..
Title: Email Security Incident at University of Chicago Medical Center
Description: The Maine Office of the Attorney General reported that the University of Chicago Medical Center experienced an email security incident allowing unauthorized access to personal information between January 4, 2024, and January 30, 2024, affecting a total of 10,332 individuals. The breach was discovered on March 28, 2024, and social security numbers were among the types of compromised information.
Date Detected: 2024-03-28
Type: Data Breach
Attack Vector: Email
Title: Data Breach at Nationwide Recovery Services Affecting University of Chicago Medicine Medical Group Patients
Description: Information from 38,000 University of Chicago Medicine (UCM) Medical Group patients was stolen following a breach of third-party debt collection agency Nationwide Recovery Services in July. Attackers obtained patients' names, birthdates, addresses, Social Security numbers, financial data, and/or medical details. The breach did not affect University of Chicago Medical Center patients. Affected individuals were advised to monitor their credit reports and account statements for potential fraud. This incident highlights the rising cybercrime targeting the healthcare industry.
Type: data breach
Motivation: financial gaindata theft
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security numbers

Data Compromised: Names, Birthdates, Addresses, Social security numbers, Financial data, Medical details
Brand Reputation Impact: potential reputational damage due to patient data exposure
Identity Theft Risk: high (patients advised to monitor credit reports)
Payment Information Risk: financial data compromised
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, , Pii (Personally Identifiable Information), Phi (Protected Health Information), Financial Data and .

Entity Name: University of Chicago Medical Center
Entity Type: Healthcare
Industry: Healthcare
Location: Chicago, IL
Customers Affected: 10332

Entity Name: University of Chicago Medicine Medical Group
Entity Type: healthcare provider
Industry: healthcare
Location: Chicago, Illinois, USA
Customers Affected: 38,000 patients

Entity Name: Nationwide Recovery Services
Entity Type: third-party vendor (debt collection agency)
Industry: financial services

Communication Strategy: advisory to affected patients to monitor credit reports and account statements

Type of Data Compromised: Social security numbers
Number of Records Exposed: 10332
Sensitivity of Data: High

Type of Data Compromised: Pii (personally identifiable information), Phi (protected health information), Financial data
Number of Records Exposed: 38,000
Sensitivity of Data: high (includes SSNs, medical details, financial data)

Regulations Violated: potential HIPAA violations (if PHI was unsecured),

Lessons Learned: Increased vigilance required for third-party vendor security in the healthcare sector due to rising cybercrime targeting hospitals and patient data.

Recommendations: Enhance third-party vendor risk assessments and security audits., Implement stricter data protection measures for PII/PHI shared with external partners., Provide credit monitoring services to affected patients., Improve incident response coordination between healthcare providers and third-party vendors.Enhance third-party vendor risk assessments and security audits., Implement stricter data protection measures for PII/PHI shared with external partners., Provide credit monitoring services to affected patients., Improve incident response coordination between healthcare providers and third-party vendors.Enhance third-party vendor risk assessments and security audits., Implement stricter data protection measures for PII/PHI shared with external partners., Provide credit monitoring services to affected patients., Improve incident response coordination between healthcare providers and third-party vendors.Enhance third-party vendor risk assessments and security audits., Implement stricter data protection measures for PII/PHI shared with external partners., Provide credit monitoring services to affected patients., Improve incident response coordination between healthcare providers and third-party vendors.
Key Lessons Learned: The key lessons learned from past incidents are Increased vigilance required for third-party vendor security in the healthcare sector due to rising cybercrime targeting hospitals and patient data.

Source: Maine Office of the Attorney General

Source: CBS News Chicago
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General, and Source: CBS News Chicago.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through advisory to affected patients to monitor credit reports and account statements.

Stakeholder Advisories: Patients advised to monitor credit reports and account statements for fraud.
Customer Advisories: UCM Medical Group notified affected patients of the breach and potential risks.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Patients advised to monitor credit reports and account statements for fraud. and UCM Medical Group notified affected patients of the breach and potential risks..

High Value Targets: Patient Pii/Phi, Financial Data,
Data Sold on Dark Web: Patient Pii/Phi, Financial Data,

Root Causes: Third-Party Vendor (Nationwide Recovery Services) Breach, Potential Inadequate Security Controls At Vendor Level,
Most Recent Incident Detected: The most recent incident detected was on 2024-03-28.
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security Numbers, , names, birthdates, addresses, Social Security numbers, financial data, medical details and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, addresses, financial data, medical details, birthdates, names and Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 38.1K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Increased vigilance required for third-party vendor security in the healthcare sector due to rising cybercrime targeting hospitals and patient data.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance third-party vendor risk assessments and security audits., Improve incident response coordination between healthcare providers and third-party vendors., Implement stricter data protection measures for PII/PHI shared with external partners. and Provide credit monitoring services to affected patients..
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and CBS News Chicago.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Patients advised to monitor credit reports and account statements for fraud., .
Most Recent Customer Advisory: The most recent customer advisory issued was an UCM Medical Group notified affected patients of the breach and potential risks.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.