ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Harbourview Family Health Team (HFHT) is a well-established primary care team based in Thunder Bay, dedicated to delivering high-quality, team-based care to our patients and their families. Our interdisciplinary team includes nurse practitioners, registered nurses, a registered dietitian, social workers, administrative professionals, and 14 family physicians.

Harbourview Family Health Team A.I CyberSecurity Scoring

HFHT

Company Details

Linkedin ID:

harbourview-family-health-team

Website:
Employees number:

16

Number of followers:

114

NAICS:

621

Industry Type:

Medical Practices

Homepage:

hfht.ca

IP Addresses:

0

Company ID:

HAR_2645371

Scan Status:

In-progress

AI scoreHFHT Risk Score (AI oriented)

Between 600 and 649

https://images.rankiteo.com/companyimages/harbourview-family-health-team.jpeg
HFHT Medical Practices
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHFHT Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/harbourview-family-health-team.jpeg
HFHT Medical Practices
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

HFHT Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Harbourview Family Health Team: Exclusive: Harbour Town Doctors suffers alleged patient data breachRansomware100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: **Rhysida Ransomware Group Claims Attack on Queensland Medical Centre, Threatens Patient Data Sale** The Rhysida ransomware group has listed **Harbour Town Doctors**, a Queensland-based medical centre, as a victim on its dark web extortion site. The attack was publicly claimed on **December 11**, with the group posting low-resolution images of allegedly stolen data, including files bearing the clinic’s letterhead, **patient health summaries**, medical record transfer requests, and pathology reports. Rhysida set a **seven-day ransom deadline** and is currently offering the data for sale to a single buyer for **five Bitcoin (approximately $137,000)**. The group stated that the data would be sold exclusively, with no resale permitted, framing it as a "unique opportunity" for potential buyers. Harbour Town Doctors has not responded to requests for comment. **About Rhysida** Rhysida is a **ransomware-as-a-service (RaaS) operation**, first observed in mid-2023, with **254 claimed victims** to date. The financially motivated group, which communicates in Russian, has a history of targeting the **healthcare sector**. Notable past attacks include: - **Prospect Medical Holdings (August 2023)**: Disrupted 17 hospitals and 166 clinics in the U.S., exposing **500,000 Social Security numbers, medical records, and passport details**. - **Sunflower Medical Group (January 2025)**: Allegedly stole **three terabytes of data**, impacting over **400,000 patients**. - **Daughterly Care (September 2024)**: A Sydney-based aged-care provider, marking Rhysida’s previous Australian healthcare victim. **About Harbour Town Doctors** Located in **Biggera Waters, Queensland**, the clinic provides **family medicine, skin cancer treatment, and chronic disease management**, employing five doctors and administrative staff. The centre markets itself as offering **personalised, team-based care** through experienced healthcare professionals.

Harbourview Family Health Team: Exclusive: Harbour Town Doctors suffers alleged patient data breach
Ransomware
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: **Rhysida Ransomware Group Claims Attack on Queensland Medical Centre, Threatens Patient Data Sale** The Rhysida ransomware group has listed **Harbour Town Doctors**, a Queensland-based medical centre, as a victim on its dark web extortion site. The attack was publicly claimed on **December 11**, with the group posting low-resolution images of allegedly stolen data, including files bearing the clinic’s letterhead, **patient health summaries**, medical record transfer requests, and pathology reports. Rhysida set a **seven-day ransom deadline** and is currently offering the data for sale to a single buyer for **five Bitcoin (approximately $137,000)**. The group stated that the data would be sold exclusively, with no resale permitted, framing it as a "unique opportunity" for potential buyers. Harbour Town Doctors has not responded to requests for comment. **About Rhysida** Rhysida is a **ransomware-as-a-service (RaaS) operation**, first observed in mid-2023, with **254 claimed victims** to date. The financially motivated group, which communicates in Russian, has a history of targeting the **healthcare sector**. Notable past attacks include: - **Prospect Medical Holdings (August 2023)**: Disrupted 17 hospitals and 166 clinics in the U.S., exposing **500,000 Social Security numbers, medical records, and passport details**. - **Sunflower Medical Group (January 2025)**: Allegedly stole **three terabytes of data**, impacting over **400,000 patients**. - **Daughterly Care (September 2024)**: A Sydney-based aged-care provider, marking Rhysida’s previous Australian healthcare victim. **About Harbour Town Doctors** Located in **Biggera Waters, Queensland**, the clinic provides **family medicine, skin cancer treatment, and chronic disease management**, employing five doctors and administrative staff. The centre markets itself as offering **personalised, team-based care** through experienced healthcare professionals.

Ailogo

HFHT Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for HFHT

Incidents vs Medical Practices Industry Average (This Year)

Harbourview Family Health Team has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Harbourview Family Health Team has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types HFHT vs Medical Practices Industry Avg (This Year)

Harbourview Family Health Team reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — HFHT (X = Date, Y = Severity)

HFHT cyber incidents detection timeline including parent company and subsidiaries

HFHT Company Subsidiaries

SubsidiaryImage

Harbourview Family Health Team (HFHT) is a well-established primary care team based in Thunder Bay, dedicated to delivering high-quality, team-based care to our patients and their families. Our interdisciplinary team includes nurse practitioners, registered nurses, a registered dietitian, social workers, administrative professionals, and 14 family physicians.

Loading...
similarCompanies

HFHT Similar Companies

Hamad Medical Corporation

Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

newsone

HFHT CyberSecurity News

October 16, 2024 07:00 AM
Dr. Joseph Henry Behse's obituary | OMA

It is with heavy hearts that we announce the passing of Joe Behse with family by his side at the Thunder Bay Regional Health Sciences Centre.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HFHT CyberSecurity History Information

Official Website of Harbourview Family Health Team

The official website of Harbourview Family Health Team is www.hfht.ca.

Harbourview Family Health Team’s AI-Generated Cybersecurity Score

According to Rankiteo, Harbourview Family Health Team’s AI-generated cybersecurity score is 634, reflecting their Poor security posture.

How many security badges does Harbourview Family Health Team’ have ?

According to Rankiteo, Harbourview Family Health Team currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Harbourview Family Health Team have SOC 2 Type 1 certification ?

According to Rankiteo, Harbourview Family Health Team is not certified under SOC 2 Type 1.

Does Harbourview Family Health Team have SOC 2 Type 2 certification ?

According to Rankiteo, Harbourview Family Health Team does not hold a SOC 2 Type 2 certification.

Does Harbourview Family Health Team comply with GDPR ?

According to Rankiteo, Harbourview Family Health Team is not listed as GDPR compliant.

Does Harbourview Family Health Team have PCI DSS certification ?

According to Rankiteo, Harbourview Family Health Team does not currently maintain PCI DSS compliance.

Does Harbourview Family Health Team comply with HIPAA ?

According to Rankiteo, Harbourview Family Health Team is not compliant with HIPAA regulations.

Does Harbourview Family Health Team have ISO 27001 certification ?

According to Rankiteo,Harbourview Family Health Team is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Harbourview Family Health Team

Harbourview Family Health Team operates primarily in the Medical Practices industry.

Number of Employees at Harbourview Family Health Team

Harbourview Family Health Team employs approximately 16 people worldwide.

Subsidiaries Owned by Harbourview Family Health Team

Harbourview Family Health Team presently has no subsidiaries across any sectors.

Harbourview Family Health Team’s LinkedIn Followers

Harbourview Family Health Team’s official LinkedIn profile has approximately 114 followers.

NAICS Classification of Harbourview Family Health Team

Harbourview Family Health Team is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.

Harbourview Family Health Team’s Presence on Crunchbase

No, Harbourview Family Health Team does not have a profile on Crunchbase.

Harbourview Family Health Team’s Presence on LinkedIn

Yes, Harbourview Family Health Team maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/harbourview-family-health-team.

Cybersecurity Incidents Involving Harbourview Family Health Team

As of December 15, 2025, Rankiteo reports that Harbourview Family Health Team has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Harbourview Family Health Team has an estimated 9,003 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Harbourview Family Health Team ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Rhysida Ransomware Attack on Harbour Town Doctors

Description: A ransomware group, Rhysida, listed Queensland-based medical centre Harbour Town Doctors as a victim on its dark net extortion site. The group claimed the attack on December 11, posting low-resolution images of allegedly exposed patient data, including medical records, health summaries, and pathology reports. The data was put up for sale for five Bitcoin (roughly $137,000) with a seven-day ransom deadline.

Date Publicly Disclosed: 2023-12-11

Type: Ransomware

Threat Actor: Rhysida

Motivation: Financial

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware HAR1765764164

Data Compromised: Patient data, medical records, health summaries, pathology reports

Brand Reputation Impact: Likely significant

Legal Liabilities: Potential

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Data, Medical Records, Health Summaries, Pathology Reports and .

Which entities were affected by each incident ?

Incident : Ransomware HAR1765764164

Entity Name: Harbour Town Doctors

Entity Type: Medical Centre

Industry: Healthcare

Location: Bigger Waters, Queensland, Australia

Size: 5 doctors and administrative staff

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware HAR1765764164

Type of Data Compromised: Patient data, Medical records, Health summaries, Pathology reports

Sensitivity of Data: High

Data Exfiltration: Yes

Data Encryption: Yes (ransomware encryption)

File Types Exposed: Medical documentsPatient health summariesPathology reports

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware HAR1765764164

Ransom Demanded: 5 Bitcoin (~$137,000)

Ransomware Strain: Rhysida

Data Encryption: Yes

Data Exfiltration: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Ransomware HAR1765764164

Regulations Violated: Likely Australian Privacy Principles (APP), Potential Notifiable Data Breaches (NDB) scheme,

References

Where can I find more information about each incident ?

Incident : Ransomware HAR1765764164

Source: Cyber Daily

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Daily.

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 5 Bitcoin (~$137,000).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Rhysida.

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-11.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Patient data, medical records, health summaries and pathology reports.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patient data, medical records, health summaries and pathology reports.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 5 Bitcoin (~$137,000).

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Cyber Daily.

cve

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=harbourview-family-health-team' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge