Company Details
centerstone
2,942
14,921
62133
centerstone.org
0
CEN_3318262
In-progress

Centerstone Company CyberSecurity Posture
centerstone.orgCenterstone is a nonprofit health system specializing in mental health and substance use disorder treatments for people of all ages. Services are available in Florida, Illinois, Indiana, North Carolina, and Tennessee through the operation of outpatient clinics, residential programs, school-based services, telehealth, and an inpatient hospital. Centerstone also offers specialized programs available nationwide for the military community, as well as services for children, including therapeutic foster care. Centerstone’s Institute provides guidance through research and technology, leveraging the best evidence-based practices for use across our communities. Centerstone’s Foundation secures philanthropic resources to support the work and mission of delivering care that changes people’s lives. Learn more by visiting Centerstone.org.
Company Details
centerstone
2,942
14,921
62133
centerstone.org
0
CEN_3318262
In-progress
Between 650 and 699

Centerstone Global Score (TPRM)XXXX

Description: According to Joseph Wenzel, Centerstone, a provider of assistance for substance addiction and mental health, is informing staff members and clients of a breach. An employee of Centerstone of Tennessee, Inc. discovered suspicious behaviour in their email account, which led to the beginning of the inquiry into the IT security problem. Unauthorised access or acquisition of certain current and former Centerstone patients' and employees' personal information was discovered, according to Centerstone.
Description: Centerstone, a national provider of mental health, addiction recovery, residential care, therapeutic foster care, counseling, and crisis services, suffered a data security incident after unauthorized individuals got access to 3 employee email accounts between November 4, 2021, and February 14, 2022. The compromised information included name, address, Social Security number, date of birth, client ID, medical diagnosis/treatment information, and health insurance information. Centerstone worked to implement additional safeguards to help ensure the security of its email environment and to reduce the risk of a similar incident occurring in the future.
Description: Centerstone, a nonprofit health organization suffered a data security incident that exposed the personal and protected health information belonging to certain current and former Centerstone clients. The compromised information included name, address, Social Security number, date of birth, client ID, medical diagnosis/treatment information, and/or health insurance information. Centerstone is working to implement additional safeguards to help ensure the security of its email environment and to reduce the risk of a similar incident occurring in the future. Along with notifying the affected individuals it also established a toll-free call centre to answer questions about the incident.
Description: Centerstone, a nonprofit health organization provides mental health, addiction recovery, residential care, therapeutic foster care, counseling, and crisis services across the country. It faced a data security incident that have involved personal and protected health information belonging to certain current and former Centerstone clients. Centerstone has sent notification of this incident to potentially impacted individuals and is providing resources to assist them. Centerstone detected unusual activity involving its email environment and took immediate steps to secure its email environment by launching a thorough investigation to determine the scope of the issue. Investigation determined that an unknown actor gained access to and obtained a limited amount of data from three employee email accounts between November 4, 2021 and February 14, 2022. Centerstone undertook a comprehensive review of the full contents of the email accounts to identify whether any individual information was contained therein. The email accounts contained certain personal and protected health information. Currently there is no evidence of the misuse of any information potentially involved in this incident.


No incidents recorded for Centerstone in 2025.
No incidents recorded for Centerstone in 2025.
No incidents recorded for Centerstone in 2025.
Centerstone cyber incidents detection timeline including parent company and subsidiaries

Centerstone is a nonprofit health system specializing in mental health and substance use disorder treatments for people of all ages. Services are available in Florida, Illinois, Indiana, North Carolina, and Tennessee through the operation of outpatient clinics, residential programs, school-based services, telehealth, and an inpatient hospital. Centerstone also offers specialized programs available nationwide for the military community, as well as services for children, including therapeutic foster care. Centerstone’s Institute provides guidance through research and technology, leveraging the best evidence-based practices for use across our communities. Centerstone’s Foundation secures philanthropic resources to support the work and mission of delivering care that changes people’s lives. Learn more by visiting Centerstone.org.


Parnassia Groep is er voor uw gezondheid, dat doen wij met ruim 8.000 medewerkers. Zij zijn werkzaam op 560 locaties, die u vindt vooral in onze drie kernregio's Noord-Holland, Haaglanden, Rijnmond (waaronder de Zuid-Hollandse Eilanden). Welk psychisch of psychiatrisch probleem u ook heeft, wij h
.png)
CEO Anthony Stevens says 6clicks' AI capabilities and advanced reporting is changing how organisations manage their governance,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Centerstone is http://www.centerstone.org.
According to Rankiteo, Centerstone’s AI-generated cybersecurity score is 682, reflecting their Weak security posture.
According to Rankiteo, Centerstone currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Centerstone is not certified under SOC 2 Type 1.
According to Rankiteo, Centerstone does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Centerstone is not listed as GDPR compliant.
According to Rankiteo, Centerstone does not currently maintain PCI DSS compliance.
According to Rankiteo, Centerstone is not compliant with HIPAA regulations.
According to Rankiteo,Centerstone is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Centerstone operates primarily in the Mental Health Care industry.
Centerstone employs approximately 2,942 people worldwide.
Centerstone presently has no subsidiaries across any sectors.
Centerstone’s official LinkedIn profile has approximately 14,921 followers.
Centerstone is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Centerstone does not have a profile on Crunchbase.
Yes, Centerstone maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/centerstone.
As of December 01, 2025, Rankiteo reports that Centerstone has experienced 4 cybersecurity incidents.
Centerstone has an estimated 5,042 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with secured email environment, launched thorough investigation, and communication strategy with notification to potentially impacted individuals, providing resources to assist them, and remediation measures with implement additional safeguards to secure email environment, remediation measures with reduce risk of similar incidents, and communication strategy with notified affected individuals, communication strategy with established toll-free call center, and remediation measures with implemented additional safeguards to ensure the security of its email environment..
Title: Centerstone Data Security Incident
Description: Centerstone, a nonprofit health organization, experienced a data security incident involving personal and protected health information of current and former clients. Unusual activity was detected in its email environment, and an investigation revealed that an unknown actor accessed and obtained data from three employee email accounts between November 4, 2021, and February 14, 2022.
Type: Data Breach
Attack Vector: Email Compromise
Vulnerability Exploited: Email Security
Threat Actor: Unknown
Title: Centerstone Data Security Incident
Description: Centerstone, a nonprofit health organization suffered a data security incident that exposed the personal and protected health information belonging to certain current and former Centerstone clients.
Type: Data Breach
Attack Vector: Email Environment
Title: Centerstone Data Security Incident
Description: Centerstone, a national provider of mental health, addiction recovery, residential care, therapeutic foster care, counseling, and crisis services, suffered a data security incident after unauthorized individuals got access to 3 employee email accounts between November 4, 2021, and February 14, 2022.
Date Detected: November 4, 2021
Date Resolved: February 14, 2022
Type: Data Breach
Attack Vector: Email Account Compromise
Threat Actor: Unauthorized Individuals
Title: Centerstone Data Breach
Description: Centerstone, a provider of assistance for substance addiction and mental health, is informing staff members and clients of a breach. An employee of Centerstone of Tennessee, Inc. discovered suspicious behaviour in their email account, which led to the beginning of the inquiry into the IT security problem. Unauthorised access or acquisition of certain current and former Centerstone patients' and employees' personal information was discovered, according to Centerstone.
Type: Data Breach
Attack Vector: Email Compromise
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Environment and Email Accounts.

Data Compromised: Personal and Protected Health Information
Systems Affected: Email Environment

Data Compromised: Name, Address, Social security number, Date of birth, Client id, Medical diagnosis/treatment information, Health insurance information

Data Compromised: Name, Address, Social security number, Date of birth, Client id, Medical diagnosis/treatment information, Health insurance information
Systems Affected: Email Accounts

Data Compromised: Personal information of current and former patients and employees
Systems Affected: email account
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal and Protected Health Information, Pii, Phi, , Personal Information, Health Information, , Personal Information and .

Entity Name: Centerstone
Entity Type: Nonprofit Health Organization
Industry: Healthcare

Entity Name: Centerstone
Entity Type: Nonprofit Health Organization
Industry: Healthcare

Entity Name: Centerstone
Entity Type: Healthcare Provider
Industry: Mental Health and Addiction Recovery

Entity Name: Centerstone
Entity Type: Organization
Industry: Healthcare
Location: Tennessee

Containment Measures: Secured email environment, launched thorough investigation
Communication Strategy: Notification to potentially impacted individuals, providing resources to assist them

Remediation Measures: Implement additional safeguards to secure email environmentReduce risk of similar incidents
Communication Strategy: Notified affected individualsEstablished toll-free call center

Remediation Measures: Implemented additional safeguards to ensure the security of its email environment

Type of Data Compromised: Personal and Protected Health Information

Type of Data Compromised: Personal information, Health information
Sensitivity of Data: High

Type of Data Compromised: Personal information
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implement additional safeguards to secure email environment, Reduce risk of similar incidents, , Implemented additional safeguards to ensure the security of its email environment, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured email environment and launched thorough investigation.

Investigation Status: Completed
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification to potentially impacted individuals, providing resources to assist them, Notified Affected Individuals and Established Toll-Free Call Center.

Entry Point: Email Environment

Entry Point: Email Accounts

Root Causes: Email Compromise

Corrective Actions: Implemented Additional Safeguards To Ensure The Security Of Its Email Environment,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implemented Additional Safeguards To Ensure The Security Of Its Email Environment, .
Last Attacking Group: The attacking group in the last incident were an Unknown and Unauthorized Individuals.
Most Recent Incident Detected: The most recent incident detected was on November 4, 2021.
Most Recent Incident Resolved: The most recent incident resolved was on February 14, 2022.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal and Protected Health Information, name, address, Social Security number, date of birth, client ID, medical diagnosis/treatment information, health insurance information, , Name, Address, Social Security Number, Date of Birth, Client ID, Medical Diagnosis/Treatment Information, Health Insurance Information, , personal information of current and former patients and employees and .
Most Significant System Affected: The most significant system affected in an incident was Email Accounts and email account.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Secured email environment and launched thorough investigation.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Client ID, personal information of current and former patients and employees, client ID, Date of Birth, medical diagnosis/treatment information, Social Security number, Personal and Protected Health Information, date of birth, name, health insurance information, Address, Medical Diagnosis/Treatment Information, Health Insurance Information, Name, address and Social Security Number.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Email Environment and Email Accounts.
.png)
A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
A weakness has been identified in winston-dsouza Ecommerce-Website up to 87734c043269baac0b4cfe9664784462138b1b2e. Affected by this issue is some unknown functionality of the file /includes/header_menu.php of the component GET Parameter Handler. Executing manipulation of the argument Error can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
A security flaw has been discovered in Qualitor 8.20/8.24. Affected by this vulnerability is the function eval of the file /html/st/stdeslocamento/request/getResumo.php. Performing manipulation of the argument passageiros results in code injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.