Company Details
centerpointe
183
1,789
62133
centerpointe.org
0
CEN_3361508
In-progress


CenterPointe Company CyberSecurity Posture
centerpointe.orgCenterPointe offers over 40 programs including mental health and substance use treatment, primary care, rehabilitation, medication management, crisis response, and housing. We're all about investing in our employees and committing to a culture of growth, development, inclusivity, and engagement. Work-life balance is of critical importance to us, which is why we offer things like Mental Wellness hours, flexible scheduling, and generous paid time off - so we can all take time for self-care! Taking care of our employees is yet another way we've committed to helping the people we serve get better, sooner, for longer.
Company Details
centerpointe
183
1,789
62133
centerpointe.org
0
CEN_3361508
In-progress
Between 750 and 799

CenterPointe Global Score (TPRM)XXXX



No incidents recorded for CenterPointe in 2026.
No incidents recorded for CenterPointe in 2026.
No incidents recorded for CenterPointe in 2026.
CenterPointe cyber incidents detection timeline including parent company and subsidiaries

CenterPointe offers over 40 programs including mental health and substance use treatment, primary care, rehabilitation, medication management, crisis response, and housing. We're all about investing in our employees and committing to a culture of growth, development, inclusivity, and engagement. Work-life balance is of critical importance to us, which is why we offer things like Mental Wellness hours, flexible scheduling, and generous paid time off - so we can all take time for self-care! Taking care of our employees is yet another way we've committed to helping the people we serve get better, sooner, for longer.


At SUWS wilderness treatment program, students work through addiction, depression, developmental disorders, and behavioral issues with experienced staff members in a supportive outdoor environment free from the stresses and distractions of everyday life. SUWS of the Carolinas operates within the Pis

Stone Belt is one of the oldest and largest service providers for individuals with developmental disabilities in south central Indiana. We are committed to quality service and invite the entire community to play a role in preparing, empowering and supporting persons with developmental disabilities.
Active Minds is the largest nonprofit in the United States mobilizing youth and young adults to transform mental health norms across society. For more than 20 years, we have equipped the next generation of peer mental health advocates through a variety of programs, including the Active Minds Chapter

COPE Center, Inc. is a non profit community-based behavioral healthcare agency serving the residents of Essex County and surrounding areas. The name is an acronym for Counseling, Outreach, Prevention and Education, all areas in which professional staff are actively engaged. Incepted in 1968 by th

LIFE UNLIMITED: The Center for Human Possibility is a holding space and learning center that allows for the possibility and opportunity to evolve. Through her workshops & webinars, and through her transformative work with individuals, couples, professionals and organizations, Lynda is committed to b

Founded by parents of children with autism, Breakthrough Corporation, a non-profit agency, is changing the way autism services are provided for in Tennessee. We offer: residential services, in-home supports, personal assistance, day services, a Saturday therapeutic recreation program; day activi

FELIX Foundation is dedicated to your recovery and wellness. Our clients come to us in need of mental health services, housing and support. FELIX programs allow clients a fresh start in their recovery, safe housing and supportive services. FELIX FOUNDATION IS A 501(C)(3) NOT-FOR-PROFIT ORGANIZATI

The Healthy Teen Project provides Intensive Outpatient and Partial Hospitalization treatment programs for teenagers who struggle with eating disorders in the San Francisco Bay Area. Eating disorders create significant challenges for teens and their families in all aspects of their lives. Sometime

Counseling Center of West Michigan is a large multi location private practice where therapists are deeply valued and heavily supported while still enjoying the autonomy to practice independently. Relationships are at the center of everything we do at CCWM. We recognize that just as our clients desir
.png)
ENGlobal details cybersecurity breach, as CenterPoint Energy probes potential data ... as CenterPoint Energy probes potential data leak. January 30, 2025.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CenterPointe is http://www.centerpointe.org.
According to Rankiteo, CenterPointe’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, CenterPointe currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CenterPointe has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, CenterPointe is not certified under SOC 2 Type 1.
According to Rankiteo, CenterPointe does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CenterPointe is not listed as GDPR compliant.
According to Rankiteo, CenterPointe does not currently maintain PCI DSS compliance.
According to Rankiteo, CenterPointe is not compliant with HIPAA regulations.
According to Rankiteo,CenterPointe is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CenterPointe operates primarily in the Mental Health Care industry.
CenterPointe employs approximately 183 people worldwide.
CenterPointe presently has no subsidiaries across any sectors.
CenterPointe’s official LinkedIn profile has approximately 1,789 followers.
CenterPointe is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, CenterPointe does not have a profile on Crunchbase.
Yes, CenterPointe maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/centerpointe.
As of January 23, 2026, Rankiteo reports that CenterPointe has not experienced any cybersecurity incidents.
CenterPointe has an estimated 5,279 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CenterPointe has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.