Company Details
duncanregionalhospital
196
867
62
drhhealth.org
0
DRH_6212429
In-progress

DRH Health Company CyberSecurity Posture
drhhealth.orgDRH Health is a progressive, not-for-profit community hospital that is constantly evolving to meet the ever-changing needs of the community. Our team of dedicated healthcare professionals is committed to delivering compassionate, personalized service and care to our patients and their families. DRH Health is committed to: Delivering a seamless, state-of-the-art health services environment Exceeding the expectations of those we serve. Making our patients’ ideal encounter a reality. Providing personalized care and service with a commitment to excellence.
Company Details
duncanregionalhospital
196
867
62
drhhealth.org
0
DRH_6212429
In-progress
Between 700 and 749

DRH Health Global Score (TPRM)XXXX

Description: Duncan Regional Hospital, Inc. suffered a data breach incident that impacted many individuals. A cybersecurity incident affected one of the hospital’s servers in January 2022 and compromised the consumer information of about 92,398 individuals including parties’ names and Social Security numbers. The hospital investigated the incident, secured its systems, and notified the affected individuals.
Description: Some of the systems of DRH Health suspected suspicious activity that impacted its primary electronic medical records system. The compromised information included names, Social Security numbers, dates of birth, phone numbers, addresses, limited treatment information and medical appointment information such as dates of service and names of the healthcare provider. DRH immediately implemented incident response protocols, disconnected all systems, and investigated the incident with external cybersecurity experts


No incidents recorded for DRH Health in 2025.
No incidents recorded for DRH Health in 2025.
No incidents recorded for DRH Health in 2025.
DRH Health cyber incidents detection timeline including parent company and subsidiaries

DRH Health is a progressive, not-for-profit community hospital that is constantly evolving to meet the ever-changing needs of the community. Our team of dedicated healthcare professionals is committed to delivering compassionate, personalized service and care to our patients and their families. DRH Health is committed to: Delivering a seamless, state-of-the-art health services environment Exceeding the expectations of those we serve. Making our patients’ ideal encounter a reality. Providing personalized care and service with a commitment to excellence.


Every day, 119,000 compassionate caregivers serve patients and communities through Providence St. Joseph Health, a national, Catholic, not-for-profit health system, driven by a belief that health is a human right. Rooted in the founding missions of the Sisters of Providence and the Sisters of St.
Sutter Health is a not-for-profit, people-centered healthcare system providing comprehensive care throughout California. Sutter Health is committed to innovative, high-quality patient care and community partnerships, and innovative, high-quality patient care. Today, Sutter Health is pursuing a bold
A Dasa é a maior rede de saúde integrada do Brasil. Faz parte da vida de mais de 20 milhões de pessoas por ano, com alta tecnologia, experiência intuitiva e atitude à frente do tempo. Com mais de 50 mil colaboradores e 250 mil médicos parceiros, existe para ser a saúde que as pessoas desejam e que
RWJBarnabas Health is New Jersey’s largest and most comprehensive academic health system, caring for more than 5 million people annually. Nationally renowned for quality and safety, the system includes 14 hospitals and 9,000 affiliated physicians integrated to provide care at more than 700 patient
As a premier care provider since 1985, Genesis HealthCare is a holding company with subsidiaries that, on a combined basis, provide services to skilled nursing facilities and senior living communities. Genesis also specializes in contract rehabilitation therapy, respiratory therapy, physician servic
HCA Healthcare is dedicated to giving people a healthier tomorrow. As one of the nation’s leading providers of healthcare services, HCA Healthcare is comprised of 188 hospitals and 2,400+ sites of care in 20 states and the United Kingdom. In addition to hospitals, sites of care include surgery cen
Ardent Health is a leading provider of healthcare in communities across the country. With a focus on consumer-friendly processes and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent owns an
Relationships are the heart of our culture. They help us create a sense of family among our residents, associates and patients. Integrity is our soul. It guides us to be open in our communication with each other, and it enables us to make the right decisions for the people who have entrusted us with

NorthShore University HealthSystem, Swedish Hospital, Northwest Community Healthcare and Edward-Elmhurst Health are now united under one name: Endeavor Health. Together, we’re driven by our mission to help everyone in our communities be their best and our commitment to setting a new standard for he
.png)
Duncan Regional Hospital (DRH Health) in the US has implemented Becton, Dickinson and Company's (BD) Alaris electronic medical record (EMR)...
DRH Health in Duncan, Oklahoma, will be applying artificial intelligence to clinical documentation across its hospitals and clinics due to a...
The partnership positions DRH Health among health systems utilising Ambient AI to document over 20 million clinician encounters.
The Cybersecurity and Infrastructure Security Agency has released long-awaited updated guidance on the Minimum Elements for a Software Bill...
Roger Neal, VP and COO at DRH Health, says that due to the complexities of the healthcare industry, "our goal right now needs to be to get...
The private equity firm signed a definitive agreement to acquire PatientPoint from an investor group led by L Catterton and Littlejohn & Co.
The list of victims from the data breach at the debt collection agency Nationwide Recovery Service (NRS) is steadily growing, with a further...
A third-party data breach has compromised personal information belonging to more than 200,000 Harbin Clinic patients.
Data breach at DRH Health may have exposed names, SSNs, and medical info. Check if you're affected and use offered credit monitoring.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DRH Health is http://www.drhhealth.org.
According to Rankiteo, DRH Health’s AI-generated cybersecurity score is 720, reflecting their Moderate security posture.
According to Rankiteo, DRH Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DRH Health is not certified under SOC 2 Type 1.
According to Rankiteo, DRH Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DRH Health is not listed as GDPR compliant.
According to Rankiteo, DRH Health does not currently maintain PCI DSS compliance.
According to Rankiteo, DRH Health is not compliant with HIPAA regulations.
According to Rankiteo,DRH Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DRH Health operates primarily in the Hospitals and Health Care industry.
DRH Health employs approximately 196 people worldwide.
DRH Health presently has no subsidiaries across any sectors.
DRH Health’s official LinkedIn profile has approximately 867 followers.
DRH Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, DRH Health does not have a profile on Crunchbase.
Yes, DRH Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/duncanregionalhospital.
As of December 05, 2025, Rankiteo reports that DRH Health has experienced 2 cybersecurity incidents.
DRH Health has an estimated 30,458 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with yes, and containment measures with disconnected all systems, and communication strategy with notified the affected individuals..
Title: DRH Health Data Breach
Description: Some of the systems of DRH Health suspected suspicious activity that impacted its primary electronic medical records system. The compromised information included names, Social Security numbers, dates of birth, phone numbers, addresses, limited treatment information and medical appointment information such as dates of service and names of the healthcare provider.
Type: Data Breach
Title: Duncan Regional Hospital Data Breach
Description: Duncan Regional Hospital, Inc. suffered a data breach incident that impacted many individuals. A cybersecurity incident affected one of the hospital’s servers in January 2022 and compromised the consumer information of about 92,398 individuals including parties’ names and Social Security numbers. The hospital investigated the incident, secured its systems, and notified the affected individuals.
Date Detected: January 2022
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Dates of birth, Phone numbers, Addresses, Limited treatment information, Medical appointment information
Systems Affected: primary electronic medical records system

Data Compromised: Names, Social security numbers
Systems Affected: one of the hospital’s servers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Dates Of Birth, Phone Numbers, Addresses, Limited Treatment Information, Medical Appointment Information, , Names, Social Security Numbers and .

Entity Name: DRH Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Duncan Regional Hospital, Inc.
Entity Type: Hospital
Industry: Healthcare
Customers Affected: 92,398 individuals

Incident Response Plan Activated: Yes
Third Party Assistance: Yes
Containment Measures: disconnected all systems

Communication Strategy: notified the affected individuals
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Yes.

Type of Data Compromised: Names, Social security numbers, Dates of birth, Phone numbers, Addresses, Limited treatment information, Medical appointment information
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 92,398
Sensitivity of Data: High
Personally Identifiable Information: yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnected all systems and .

Investigation Status: Investigated with external cybersecurity experts

Investigation Status: Investigated
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through notified the affected individuals.

Customer Advisories: notified the affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was notified the affected individuals.
Most Recent Incident Detected: The most recent incident detected was on January 2022.
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, dates of birth, phone numbers, addresses, limited treatment information, medical appointment information, , names, Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident was primary electronic medical records system and one of the hospital’s servers.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was disconnected all systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were limited treatment information, names, dates of birth, Social Security numbers, addresses, medical appointment information and phone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 92.4K.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigated with external cybersecurity experts.
Most Recent Customer Advisory: The most recent customer advisory issued was an notified the affected individuals.
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.