ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

In 1950, Leland Brown, MD, and Jack Walker, MD, opened an orthopedic medicine office in downtown Muncie, Indiana. At that time, the polio epidemic was in full swing, and the doctors were very busy. Although the number of cases decreased with the Salk vaccine, the orthopedic practice remained and treated some of the less complicated problems. As the office grew, Drs. Brown and Walker invited other orthopedic surgeons to join them in practice. In the 1970's the group started treating more athletes with injuries and began their professional relationship with Ball State University. The individual physicians adopted the name Central Indiana Orthopedics in 1987, and just a few years later opened its second office, located in Anderson. In 2000, the physicians of Mid America Orthopedics joined the Central Indiana Orthopedic Group. This meant there were 3 offices in Anderson at that time, so needing more space for all offices to be under one roof, Central Indiana Orthopedics Anderson office moved into the Ambulatory building across from St. John's Hospital. Currently Central Indiana Orthopedics consists of 25+ physicians (orthopedic surgeons, primary care sports medicine, physiatry, and neurosurgery), 30+ additional providers (physician assistants, nurse practitioners and physical therapists), and over 200 employees make up our TEAM. Central Indiana Orthopedics provides musculoskeletal care in our Fishers, Anderson, Muncie and Marion facilities as well as our satellite locations in Elwood and Winchester.

Central Indiana Orthopedics A.I CyberSecurity Scoring

CIO

Company Details

Linkedin ID:

central-indiana-orthopedics

Employees number:

144

Number of followers:

1,124

NAICS:

621

Industry Type:

Medical Practices

Homepage:

ciocenter.com

IP Addresses:

0

Company ID:

CEN_2815506

Scan Status:

In-progress

AI scoreCIO Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/central-indiana-orthopedics.jpeg
CIO Medical Practices
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCIO Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/central-indiana-orthopedics.jpeg
CIO Medical Practices
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CIO Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Central Indiana OrthopedicsBreach85411/2021NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Maine Office of the Attorney General reported that Central Indiana Orthopedics experienced a data breach due to an external hacking incident, discovered on November 4, 2021. The breach, which affected 83,705 individuals in total, included unauthorized access to Social Security numbers and may have involved sensitive personal information. Identity theft protection services were offered through IDX for 12 months to those impacted.

Central Indiana OrthopedicsRansomware75210/2021NA
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Central Indiana Orthopedics experienced an organization-wide network suffered from a ransomware attack in October 2021. How much data they claim to have stolen is not shown by grief. They don't say how much money they have asked as a ransom to erase any data, either. Grief often dumps some data when their victim (in this case, CIO) refuses to comply with their demands. Over time, grief often releases additional information in installments. They investigated the incident and also engaged a third-party specialized cybersecurity team of experts to assist with the restoration.

Central Indiana Orthopedics
Breach
Severity: 85
Impact: 4
Seen: 11/2021
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Maine Office of the Attorney General reported that Central Indiana Orthopedics experienced a data breach due to an external hacking incident, discovered on November 4, 2021. The breach, which affected 83,705 individuals in total, included unauthorized access to Social Security numbers and may have involved sensitive personal information. Identity theft protection services were offered through IDX for 12 months to those impacted.

Central Indiana Orthopedics
Ransomware
Severity: 75
Impact: 2
Seen: 10/2021
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack limited on finance or reputation

Description: Central Indiana Orthopedics experienced an organization-wide network suffered from a ransomware attack in October 2021. How much data they claim to have stolen is not shown by grief. They don't say how much money they have asked as a ransom to erase any data, either. Grief often dumps some data when their victim (in this case, CIO) refuses to comply with their demands. Over time, grief often releases additional information in installments. They investigated the incident and also engaged a third-party specialized cybersecurity team of experts to assist with the restoration.

Ailogo

CIO Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CIO

Incidents vs Medical Practices Industry Average (This Year)

No incidents recorded for Central Indiana Orthopedics in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Central Indiana Orthopedics in 2025.

Incident Types CIO vs Medical Practices Industry Avg (This Year)

No incidents recorded for Central Indiana Orthopedics in 2025.

Incident History — CIO (X = Date, Y = Severity)

CIO cyber incidents detection timeline including parent company and subsidiaries

CIO Company Subsidiaries

SubsidiaryImage

In 1950, Leland Brown, MD, and Jack Walker, MD, opened an orthopedic medicine office in downtown Muncie, Indiana. At that time, the polio epidemic was in full swing, and the doctors were very busy. Although the number of cases decreased with the Salk vaccine, the orthopedic practice remained and treated some of the less complicated problems. As the office grew, Drs. Brown and Walker invited other orthopedic surgeons to join them in practice. In the 1970's the group started treating more athletes with injuries and began their professional relationship with Ball State University. The individual physicians adopted the name Central Indiana Orthopedics in 1987, and just a few years later opened its second office, located in Anderson. In 2000, the physicians of Mid America Orthopedics joined the Central Indiana Orthopedic Group. This meant there were 3 offices in Anderson at that time, so needing more space for all offices to be under one roof, Central Indiana Orthopedics Anderson office moved into the Ambulatory building across from St. John's Hospital. Currently Central Indiana Orthopedics consists of 25+ physicians (orthopedic surgeons, primary care sports medicine, physiatry, and neurosurgery), 30+ additional providers (physician assistants, nurse practitioners and physical therapists), and over 200 employees make up our TEAM. Central Indiana Orthopedics provides musculoskeletal care in our Fishers, Anderson, Muncie and Marion facilities as well as our satellite locations in Elwood and Winchester.

Loading...
similarCompanies

CIO Similar Companies

Hamad Medical Corporation

Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

newsone

CIO CyberSecurity News

December 27, 2025 02:02 PM
UAH Center for Cybersecurity Research and Education opens applications for DoD cyber scholarships

HUNTSVILLE – The Center for Cybersecurity Research and Education at the University of Alabama in Huntsville has announced the availability...

December 27, 2025 12:19 PM
OpenAI's ChatGPT Atlas raises cybersecurity concerns amid prompt injection risks

OpenAI launched its AI browser, ChatGPT Atlas, allowing AI agents to access web pages and assist users with tasks such as editing emails.

December 27, 2025 09:22 AM
Coupang Stock (CPNG) Rebounds After Cybersecurity Update: Latest News, Analyst Targets, and What Investors Should Watch Before NYSE Reopens

Coupang Stock (CPNG) Rebounds After Cybersecurity Update: Latest News, Analyst Targets, and What Investors Should Watch Before NYSE Reopens...

December 27, 2025 07:40 AM
Coinbase Breach Exposes Cracks in Cryptocurrency Security

Coinbase faces major cybersecurity challenges as a $400 million data breach reveals vulnerabilities. CEO Brian Armstrong emphasizes...

December 27, 2025 04:03 AM
Spotify’s expropriation, a crypto wallet–targeting stealer, and other cybersecurity news

The week's key cybersecurity developments. 27.12.2025 ForkLog. We have gathered the week's most important cybersecurity news. Researchers found a new,...

December 27, 2025 03:55 AM
Coupang Stock (CPNG) Jumps After Cybersecurity Update: Latest News, Analyst Targets, and What Investors Should Watch Before Monday’s Open

Coupang Stock (CPNG) Jumps After Cybersecurity Update: Latest News, Analyst Targets, and What Investors Should Watch Before Monday's Open...

December 27, 2025 01:47 AM
Türkiye moves to centralize cybersecurity, digital state oversight

Türkiye expanded its Cybersecurity Directorate to include digital government and AI, aiming to strengthen coordination, security and...

December 27, 2025 12:12 AM
Here's How Blockchain Technology Is Improving Modern Cybersecurity

Blockchain's role in cybersecurity continues to expand as organizations seek reliable ways to secure data, verify identities,...

December 26, 2025 11:18 PM
Promising Cybersecurity Stocks To Consider - December 24th

CrowdStrike, Palo Alto Networks, and Fortinet are the three Cybersecurity stocks to watch today, according to MarketBeat's stock screener...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CIO CyberSecurity History Information

Official Website of Central Indiana Orthopedics

The official website of Central Indiana Orthopedics is http://ciocenter.com.

Central Indiana Orthopedics’s AI-Generated Cybersecurity Score

According to Rankiteo, Central Indiana Orthopedics’s AI-generated cybersecurity score is 674, reflecting their Weak security posture.

How many security badges does Central Indiana Orthopedics’ have ?

According to Rankiteo, Central Indiana Orthopedics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Central Indiana Orthopedics have SOC 2 Type 1 certification ?

According to Rankiteo, Central Indiana Orthopedics is not certified under SOC 2 Type 1.

Does Central Indiana Orthopedics have SOC 2 Type 2 certification ?

According to Rankiteo, Central Indiana Orthopedics does not hold a SOC 2 Type 2 certification.

Does Central Indiana Orthopedics comply with GDPR ?

According to Rankiteo, Central Indiana Orthopedics is not listed as GDPR compliant.

Does Central Indiana Orthopedics have PCI DSS certification ?

According to Rankiteo, Central Indiana Orthopedics does not currently maintain PCI DSS compliance.

Does Central Indiana Orthopedics comply with HIPAA ?

According to Rankiteo, Central Indiana Orthopedics is not compliant with HIPAA regulations.

Does Central Indiana Orthopedics have ISO 27001 certification ?

According to Rankiteo,Central Indiana Orthopedics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Central Indiana Orthopedics

Central Indiana Orthopedics operates primarily in the Medical Practices industry.

Number of Employees at Central Indiana Orthopedics

Central Indiana Orthopedics employs approximately 144 people worldwide.

Subsidiaries Owned by Central Indiana Orthopedics

Central Indiana Orthopedics presently has no subsidiaries across any sectors.

Central Indiana Orthopedics’s LinkedIn Followers

Central Indiana Orthopedics’s official LinkedIn profile has approximately 1,124 followers.

NAICS Classification of Central Indiana Orthopedics

Central Indiana Orthopedics is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.

Central Indiana Orthopedics’s Presence on Crunchbase

No, Central Indiana Orthopedics does not have a profile on Crunchbase.

Central Indiana Orthopedics’s Presence on LinkedIn

Yes, Central Indiana Orthopedics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/central-indiana-orthopedics.

Cybersecurity Incidents Involving Central Indiana Orthopedics

As of December 27, 2025, Rankiteo reports that Central Indiana Orthopedics has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Central Indiana Orthopedics has an estimated 9,042 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Central Indiana Orthopedics ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does Central Indiana Orthopedics detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with engaged a third-party specialized cybersecurity team, and recovery measures with assisted with the restoration, and third party assistance with idx..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Central Indiana Orthopedics Ransomware Attack

Description: Central Indiana Orthopedics experienced an organization-wide network suffered from a ransomware attack in October 2021.

Date Detected: October 2021

Type: Ransomware

Threat Actor: Grief

Motivation: Financial gain

Incident : Data Breach

Title: Central Indiana Orthopedics Data Breach

Description: The Maine Office of the Attorney General reported that Central Indiana Orthopedics experienced a data breach due to an external hacking incident, discovered on November 4, 2021. The breach, which affected 83,705 individuals in total, included unauthorized access to Social Security numbers and may have involved sensitive personal information. Identity theft protection services were offered through IDX for 12 months to those impacted.

Date Detected: 2021-11-04

Type: Data Breach

Attack Vector: External Hacking

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware CEN755231222

Systems Affected: Organization-wide network

Incident : Data Breach CEN236072925

Data Compromised: Social security numbers, Sensitive personal information

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, Sensitive Personal Information and .

Which entities were affected by each incident ?

Incident : Ransomware CEN755231222

Entity Name: Central Indiana Orthopedics

Entity Type: Healthcare

Industry: Healthcare

Incident : Data Breach CEN236072925

Entity Name: Central Indiana Orthopedics

Entity Type: Healthcare

Industry: Healthcare

Location: Indiana

Customers Affected: 83705

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware CEN755231222

Third Party Assistance: Engaged a third-party specialized cybersecurity team

Recovery Measures: Assisted with the restoration

Incident : Data Breach CEN236072925

Third Party Assistance: IDX

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Engaged a third-party specialized cybersecurity team, IDX.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CEN236072925

Type of Data Compromised: Social security numbers, Sensitive personal information

Number of Records Exposed: 83705

Sensitivity of Data: High

Personally Identifiable Information: Social Security numbers

Ransomware Information

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Assisted with the restoration.

References

Where can I find more information about each incident ?

Incident : Data Breach CEN236072925

Source: Maine Office of the Attorney General

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General.

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged a third-party specialized cybersecurity team, IDX.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Grief.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on October 2021.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Social Security numbers, sensitive personal information and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Organization-wide network.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged a third-party specialized cybersecurity team, IDX.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers and sensitive personal information.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 842.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.

Risk Information
cvss3
Base: 7.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Description

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=central-indiana-orthopedics' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge