ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

About Us Confluence Health is an integrated, rural healthcare delivery system with two hospitals, multi-specialty care in more than 30 service lines and primary care in 12 communities across North Central Washington. Our 300+ physicians and 175+ advanced practice clinicians serve an area of approximately 12,000 square miles and cover nearly every corner of the region through specialty outreach. Mission Statement: Local care by and for our community. Our Vision: To serve our community with compassionate care through our dedication to - Enabling joy and pride in our work, - Focusing on local sustainability, - Ensuring access for all, and - Committing to excellent care and service. Core Values: • Our patients are the reason for our being, and their needs will drive all of our actions. • We will treat everyone with dignity, respect and compassion. • We will continue to innovate ways to improve the delivery of excellent, high value care. • We will measure successes and failures and use the results to drive further improvement. • We will be a good neighbor in the communities we serve with donations of time, talent, and capital. • We will be ethical and accountable in all of our decisions and actions.

Confluence Health A.I CyberSecurity Scoring

Confluence Health

Company Details

Linkedin ID:

confluence-health

Employees number:

2,118

Number of followers:

7,197

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

confluencehealth.org

IP Addresses:

0

Company ID:

CON_2975970

Scan Status:

In-progress

AI scoreConfluence Health Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/confluence-health.jpeg
Confluence Health Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreConfluence Health Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/confluence-health.jpeg
Confluence Health Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Confluence Health Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Confluence HealthData Leak6035/2018
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Confluence Health discloses patient data breach after employee email account hacked. Compromised information included some patient information including name and treatment but no financial information was believed to be at risk. An unauthorized person may have gained access to an employee’s email account on March 30 and May 28, 2018.

Confluence Health FoundationRansomware10042/2020
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Washington State Office of the Attorney General reported on August 14, 2020, that the Confluence Health Foundation experienced a ransomware attack impacting 1,132 Washington residents. The breach occurred between April 18, 2020, and May 7, 2020, potentially compromising names and full dates of birth.

Confluence Health
Data Leak
Severity: 60
Impact: 3
Seen: 5/2018
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Confluence Health discloses patient data breach after employee email account hacked. Compromised information included some patient information including name and treatment but no financial information was believed to be at risk. An unauthorized person may have gained access to an employee’s email account on March 30 and May 28, 2018.

Confluence Health Foundation
Ransomware
Severity: 100
Impact: 4
Seen: 2/2020
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Washington State Office of the Attorney General reported on August 14, 2020, that the Confluence Health Foundation experienced a ransomware attack impacting 1,132 Washington residents. The breach occurred between April 18, 2020, and May 7, 2020, potentially compromising names and full dates of birth.

Ailogo

Confluence Health Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Confluence Health

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Confluence Health in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Confluence Health in 2025.

Incident Types Confluence Health vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Confluence Health in 2025.

Incident History — Confluence Health (X = Date, Y = Severity)

Confluence Health cyber incidents detection timeline including parent company and subsidiaries

Confluence Health Company Subsidiaries

SubsidiaryImage

About Us Confluence Health is an integrated, rural healthcare delivery system with two hospitals, multi-specialty care in more than 30 service lines and primary care in 12 communities across North Central Washington. Our 300+ physicians and 175+ advanced practice clinicians serve an area of approximately 12,000 square miles and cover nearly every corner of the region through specialty outreach. Mission Statement: Local care by and for our community. Our Vision: To serve our community with compassionate care through our dedication to - Enabling joy and pride in our work, - Focusing on local sustainability, - Ensuring access for all, and - Committing to excellent care and service. Core Values: • Our patients are the reason for our being, and their needs will drive all of our actions. • We will treat everyone with dignity, respect and compassion. • We will continue to innovate ways to improve the delivery of excellent, high value care. • We will measure successes and failures and use the results to drive further improvement. • We will be a good neighbor in the communities we serve with donations of time, talent, and capital. • We will be ethical and accountable in all of our decisions and actions.

Loading...
similarCompanies

Confluence Health Similar Companies

Banner Health

Headquartered in Arizona, Banner Health is one of the largest nonprofit health care systems in the country. The system owns and operates 33 acute-care hospitals, Banner Health Network, Banner – University Medicine, academic and employed physician groups, long-term care centers, outpatient surgery ce

University Health Network

University Health Network (UHN) is Canada's largest research hospital, which includes Toronto General and Toronto Western Hospitals, Princess Margaret Cancer Centre, the Toronto Rehabilitation Institute and the Michener Institute for Education at UHN. The scope of research and complexity of cases at

As a premier care provider since 1985, Genesis HealthCare is a holding company with subsidiaries that, on a combined basis, provide services to skilled nursing facilities and senior living communities. Genesis also specializes in contract rehabilitation therapy, respiratory therapy, physician servic

Emory Healthcare

Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai

Northwell Health

Northwell Health is New York State’s largest health care provider and private employer, with 21 hospitals, about 900 outpatient facilities and more than 12,000 affiliated physicians. We care for over two million people annually in the New York metro area and beyond, thanks to philanthropic support

Houston Methodist

Houston Methodist is one of the nation’s leading health systems and academic medical centers. The health system consists of eight hospitals: Houston Methodist Hospital, its flagship academic hospital in the Texas Medical Center, seven community hospitals and one long-term acute care hospital through

Philips

Over the past decade we have transformed into a focused leader in health technology. At Philips, our purpose is to improve people’s health and well-being through meaningful innovation. We aim to improve 2.5 billion lives per year by 2030, including 400 million in underserved communities. We see h

Texas Children's Hospital

Texas Children’s Hospital is a world-class pediatric facility, nationally recognized as a top children’s hospital, and voted one of the best places to work in Houston for nine years running. We’re committed to creating a healthy community for children by providing the best pediatric care possible, t

Massachusetts General Hospital

Guided by the needs of our patients and their families, Massachusetts General Hospital aims to deliver the very best health care in a safe, compassionate environment; to advance that care through innovative research and education; and, to improve the health and well-being of the diverse communitie

newsone

Confluence Health CyberSecurity News

July 11, 2025 07:00 AM
Apple co-founder Steve Wozniak headlining Tech Week 2025, Confluence with events aimed at celebrating innovation, developing talent

Apple Inc. co-founder Steve Wozniak is the headline speaker at Tech Week 2025, a six-day series that brings together educators, tech industry leaders, students...

March 27, 2025 07:00 AM
Washington state hospitals warn budget cuts could lead to reduced services

Washington state hospital leaders say state lawmakers' proposals could force hospitals to reduce services, and some rural communities would lose some vital...

March 07, 2025 08:00 AM
Health insurers, hospitals and clinics face more cyber attacks

Cyber criminals are targeting health clinics and other providers outside of major hospitals in steadily increasing extortion campaigns with AI the biggest...

July 09, 2024 07:00 AM
Agencies issue advisory on threat of China-based cyber group | AHA News

A joint advisory issued the week of July 8 by the Cybersecurity and Infrastructure Security Agency, National Security Agency,...

June 02, 2023 07:00 AM
Prioritizing Mental Health in Cybersecurity

Jason Lewkowicz of Optiv celebrates the importance of mental health in cybersecurity, offering best practice tips to improve employee...

May 31, 2023 07:00 AM
Managing mental health in cybersecurity

In this Help Net Security video, Jason Lewkowicz from Optiv, discusses mental health in cybersecurity, which needs more attention.

August 07, 2022 07:00 AM
Israel: At the Confluence of FinTech, Cybersecurity Innovation

From authentication technology to chargeback mitigation tools, Israel's security-focused FinTechs are securing transactions and preventing...

August 27, 2021 07:00 AM
Hacker claims he used East Wenatchee datacenter to lift T-Mobile users’ personal info

A hacker who stole millions of pieces of personal information from T-Mobile allegedly did so by carrying out a cyberintrusion into the wireless carrier's East...

December 01, 2020 08:00 AM
Patrick Carrillo | Holidays + COVID + Quarantine = STRESS!

In a “typical” year, for many people, the thought of the holiday season brings happy feelings and warm memories.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Confluence Health CyberSecurity History Information

Official Website of Confluence Health

The official website of Confluence Health is http://www.confluencehealth.org.

Confluence Health’s AI-Generated Cybersecurity Score

According to Rankiteo, Confluence Health’s AI-generated cybersecurity score is 723, reflecting their Moderate security posture.

How many security badges does Confluence Health’ have ?

According to Rankiteo, Confluence Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Confluence Health have SOC 2 Type 1 certification ?

According to Rankiteo, Confluence Health is not certified under SOC 2 Type 1.

Does Confluence Health have SOC 2 Type 2 certification ?

According to Rankiteo, Confluence Health does not hold a SOC 2 Type 2 certification.

Does Confluence Health comply with GDPR ?

According to Rankiteo, Confluence Health is not listed as GDPR compliant.

Does Confluence Health have PCI DSS certification ?

According to Rankiteo, Confluence Health does not currently maintain PCI DSS compliance.

Does Confluence Health comply with HIPAA ?

According to Rankiteo, Confluence Health is not compliant with HIPAA regulations.

Does Confluence Health have ISO 27001 certification ?

According to Rankiteo,Confluence Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Confluence Health

Confluence Health operates primarily in the Hospitals and Health Care industry.

Number of Employees at Confluence Health

Confluence Health employs approximately 2,118 people worldwide.

Subsidiaries Owned by Confluence Health

Confluence Health presently has no subsidiaries across any sectors.

Confluence Health’s LinkedIn Followers

Confluence Health’s official LinkedIn profile has approximately 7,197 followers.

NAICS Classification of Confluence Health

Confluence Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Confluence Health’s Presence on Crunchbase

No, Confluence Health does not have a profile on Crunchbase.

Confluence Health’s Presence on LinkedIn

Yes, Confluence Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/confluence-health.

Cybersecurity Incidents Involving Confluence Health

As of November 27, 2025, Rankiteo reports that Confluence Health has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Confluence Health has an estimated 29,963 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Confluence Health ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Data Leak.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Confluence Health Patient Data Breach

Description: Confluence Health discloses patient data breach after employee email account hacked. Compromised information included some patient information including name and treatment but no financial information was believed to be at risk. An unauthorized person may have gained access to an employee’s email account on March 30 and May 28, 2018.

Date Detected: 2018-03-302018-05-28

Type: Data Breach

Attack Vector: Email Account Hack

Vulnerability Exploited: Compromised Email Account

Threat Actor: Unauthorized Person

Incident : Ransomware

Title: Confluence Health Foundation Ransomware Attack

Description: The Washington State Office of the Attorney General reported on August 14, 2020, that the Confluence Health Foundation experienced a ransomware attack impacting 1,132 Washington residents. The breach occurred between April 18, 2020, and May 7, 2020, potentially compromising names and full dates of birth.

Date Detected: 2020-05-07

Date Publicly Disclosed: 2020-08-14

Type: Ransomware

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Account.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach CON027101122

Data Compromised: Patient Information (Name, Treatment)

Systems Affected: Email Account

Payment Information Risk: No

Incident : Ransomware CON117072525

Data Compromised: Names, Full dates of birth

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Information, Names, Full Dates Of Birth and .

Which entities were affected by each incident ?

Incident : Data Breach CON027101122

Entity Name: Confluence Health

Entity Type: Healthcare Provider

Industry: Healthcare

Incident : Ransomware CON117072525

Entity Name: Confluence Health Foundation

Entity Type: Healthcare

Industry: Healthcare

Location: Washington

Customers Affected: 1132

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CON027101122

Type of Data Compromised: Patient Information

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Ransomware CON117072525

Type of Data Compromised: Names, Full dates of birth

Number of Records Exposed: 1132

References

Where can I find more information about each incident ?

Incident : Ransomware CON117072525

Source: Washington State Office of the Attorney General

Date Accessed: 2020-08-14

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2020-08-14.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach CON027101122

Entry Point: Email Account

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach CON027101122

Root Causes: Compromised Email Account

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unauthorized Person.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2018-05-28.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-08-14.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Patient Information (Name, Treatment), names, full dates of birth and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patient Information (Name, Treatment), full dates of birth and names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 115.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Washington State Office of the Attorney General.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Account.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=confluence-health' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge