Company Details
globalcommunicationsinc
5
15
517
www.globalcomminc.com
0
GLO_3328289
In-progress

Global Communications & Professional Services, Inc. Company CyberSecurity Posture
www.globalcomminc.comFounded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of what’s possible, positioning ourselves at the forefront of the industry and shaping its future.
Company Details
globalcommunicationsinc
5
15
517
www.globalcomminc.com
0
GLO_3328289
In-progress
Between 650 and 699

GCPSI Global Score (TPRM)XXXX

Description: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value.


No incidents recorded for Global Communications & Professional Services, Inc. in 2025.
No incidents recorded for Global Communications & Professional Services, Inc. in 2025.
No incidents recorded for Global Communications & Professional Services, Inc. in 2025.
GCPSI cyber incidents detection timeline including parent company and subsidiaries

Founded in 1999, Global Communications & Professional Services, Inc. has become a leader in the telecommunications and utility construction industries. Our growth is fueled by a commitment to innovation and excellence, allowing us to provide advanced services that enhance connectivity and set new industry benchmarks. With a strong focus on professionalism and cutting-edge solutions, we continually push the boundaries of what’s possible, positioning ourselves at the forefront of the industry and shaping its future.


At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

TELMEX, la empresa líder de telecomunicaciones y servicios TI en México, ha realizado importantes inversiones para desarrollar la plataforma tecnológica más robusta y vanguardista del país, que le permite ofrecer la más amplia gama de soluciones, con los mayores estándares de calidad, seguridad, con

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de commu
Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,
🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

ACN is the leading direct selling telecommunications and essential services provider. ACN Inc. was founded in 1993 by four entrepreneurs and is now operating in North America. ACN offers essential products and services that people use every day, while also offering a powerful business ownership oppo
.png)
Australia has enacted the world's first ban on social media usage for users under the age of 16, in a move expected to be monitored by...
HONG KONG SAR - Media OutReach Newswire - 10 December 2025 - As digitalization accelerates, Hong Kong enterprises of all sizes are...
Presenter SpeechBatya Levi Great. Thanks, everyone, for joining. I'm Batya Levi from the communications team at UBS. And our next speaker is...
Australia's new laws banning children under 16 from social media are reshaping international debate, attracting interest from European...
Global leaders debate digital risk, truth and resilience at Abu Dhabi forum.
As VP of communications, Scully (pictured) reports to CMO Manu Orssaud. She started in the role on Monday.
PITTSBURGH: Duolingo has hired Michelle Scully as its global communications head. As VP of communications, Scully reports to CMO Manu...
Hyundai's Hi MATE Remote Fleet Management System to Utilize Iridium's IoT Services for Delivery of Critical Machine Data. MCLEAN, Va. , Dec.
Detailed price information for AT&T Inc (T-N) from The Globe and Mail including charting and trades.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Global Communications & Professional Services, Inc. is www.globalcomminc.com.
According to Rankiteo, Global Communications & Professional Services, Inc.’s AI-generated cybersecurity score is 663, reflecting their Weak security posture.
According to Rankiteo, Global Communications & Professional Services, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Global Communications & Professional Services, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Global Communications & Professional Services, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Global Communications & Professional Services, Inc. is not listed as GDPR compliant.
According to Rankiteo, Global Communications & Professional Services, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Global Communications & Professional Services, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Global Communications & Professional Services, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Global Communications & Professional Services, Inc. operates primarily in the Telecommunications industry.
Global Communications & Professional Services, Inc. employs approximately 5 people worldwide.
Global Communications & Professional Services, Inc. presently has no subsidiaries across any sectors.
Global Communications & Professional Services, Inc.’s official LinkedIn profile has approximately 15 followers.
Global Communications & Professional Services, Inc. is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Global Communications & Professional Services, Inc. does not have a profile on Crunchbase.
Yes, Global Communications & Professional Services, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/globalcommunicationsinc.
As of December 14, 2025, Rankiteo reports that Global Communications & Professional Services, Inc. has experienced 1 cybersecurity incidents.
Global Communications & Professional Services, Inc. has an estimated 9,723 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with engaged, and law enforcement notified with engaged, and recovery measures with forensic investigations, recovery measures with enhanced security training, recovery measures with access controls..
Title: Complex Assault on Global Communications Inc. by UNC3944
Description: Starting in early 2023, UNC3944 initiated a complex assault on Global Communications Inc., a leading telecommunications provider. Utilizing advanced social engineering tactics, the attackers exploited help desk personnel by impersonating internal support staff via collaboration platforms. They successfully tricked multiple employees into resetting multi-factor authentication settings, granting the threat actors unauthorized access to internal systems. Once inside, UNC3944 deployed a custom ransomware strain that encrypted critical network infrastructure, halting customer billing processes and service provisioning. Simultaneously, they exfiltrated terabytes of sensitive customer records, including personal identifiers, financial account details, and call metadata. When the company refused initial ransom demands, the group issued public extortion threats and began leaking customer datasets on underground forums. The combined encryption of business-critical systems and exposure of private customer information resulted in significant service outages, regulatory scrutiny, and widespread loss of consumer trust. Global Communications Inc. was forced to allocate substantial resources towards forensic investigations, incident response, and customer remediation efforts, ultimately incurring millions in recovery costs and potential class-action lawsuits. Law enforcement agencies and third-party forensic teams were engaged to contain the breach, and Global Communications deployed enhanced security training and access controls post-incident. The reputational damage led to a temporary spike in customer churn and a noticeable decline in share value.
Date Detected: Early 2023
Type: Ransomware and Data Breach
Attack Vector: Social Engineering
Vulnerability Exploited: Human (Help Desk Personnel)
Threat Actor: UNC3944
Motivation: Financial Gain and Data Theft
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Help Desk Personnel.

Financial Loss: Millions in recovery costs
Data Compromised: Personal identifiers, Financial account details, Call metadata
Systems Affected: Critical Network Infrastructure
Downtime: Significant Service Outages
Operational Impact: Halted Customer Billing Processes and Service Provisioning
Brand Reputation Impact: Widespread Loss of Consumer Trust
Legal Liabilities: Potential Class-Action Lawsuits
Identity Theft Risk: High
Payment Information Risk: High
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiers, Financial Account Details, Call Metadata and .

Entity Name: Global Communications Inc.
Entity Type: Telecommunications Provider
Industry: Telecommunications

Third Party Assistance: Engaged
Law Enforcement Notified: Engaged
Recovery Measures: Forensic InvestigationsEnhanced Security TrainingAccess Controls
Third-Party Assistance: The company involves third-party assistance in incident response through Engaged.

Type of Data Compromised: Personal identifiers, Financial account details, Call metadata
Number of Records Exposed: Terabytes
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Ransom Demanded: Yes
Ransom Paid: No
Ransomware Strain: Custom
Data Encryption: Yes
Data Exfiltration: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Forensic Investigations, Enhanced Security Training, Access Controls, .

Legal Actions: Potential Class-Action Lawsuits
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential Class-Action Lawsuits.

Investigation Status: Ongoing

Entry Point: Help Desk Personnel

Root Causes: Social Engineering and Human Error
Corrective Actions: Enhanced Security Training, Access Controls,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security Training, Access Controls, .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was Yes.
Last Attacking Group: The attacking group in the last incident was an UNC3944.
Most Recent Incident Detected: The most recent incident detected was on Early 2023.
Highest Financial Loss: The highest financial loss from an incident was Millions in recovery costs.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Identifiers, Financial Account Details, Call Metadata and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Call Metadata, Personal Identifiers and Financial Account Details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential Class-Action Lawsuits.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Help Desk Personnel.
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.