Comparison Overview

Health Link Home Health and Hospice Agency

VS

UHS

Health Link Home Health and Hospice Agency

868 Brannan St, San Francisco, CA, 94103, US
Last Update: 2025-03-14 (UTC)
Between 800 and 900

Strong

Health Link Home Health and Hospice provides responsive in-home health care to individuals and families. Our CA-certified, licensed, registered, nursing staff works closely with you, your family, and your medical team to ensure that we are providing the highest quality treatment. We embrace a collaborative communication style to ensure the proper administration of a patientโ€™s Plan of Care. Our goal is to facilitate the best possible environment for our patientโ€™s care. We know that there is no place like home to get well.

NAICS: 62
NAICS Definition:
Employees: 79
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

UHS

367 S Gulph Rd, King of Prussia, PA, 19406, US
Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

One of the nationโ€™s largest and most respected providers of hospital and healthcare services, Universal Health Services, Inc. has built an impressive record of achievement and performance. Growing steadily since our inception into an esteemed Fortune 300 corporation, our annual revenues during 2024 were approximately $15.8 billion. UHS was again recognized as one of the Worldโ€™s Most Admired Companies by Fortune; ranked #299 on the Fortune 500; and ranked #399 among U.S. companies on Forbes Global 2000 Worldโ€™s Largest Public Companies. Our operating philosophy is as effective today as it was upon the Companyโ€™s founding in 1979, enabling us to provide compassionate care to our patients and their loved ones. Our strategy includes building or acquiring high quality hospitals in rapidly growing markets, investing in the people and equipment needed to allow each facility to thrive, and becoming the leading healthcare provider in each community we serve. Headquartered in King of Prussia, PA, UHS has approximately 99,000 employees and through its subsidiaries operates 28 inpatient acute care hospitals, 331 inpatient behavioral health facilities, 60 outpatient and other facilities, an insurance offering, a physician network and various related services located in 39 U.S. States, Washington, D.C., Puerto Rico and the United Kingdom. It acts as the advisor to Universal Health Realty Income Trust, a real estate investment trust (NYSE:UHT). For additional information visit www.uhs.com.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 10,530
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/uhs.jpeg
UHS
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Health Link Home Health and Hospice Agency
Compliance Rate
0/4 Standards Verified
UHS
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Health Link Home Health and Hospice Agency in 2025.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for UHS in 2025.

Incident History โ€” Health Link Home Health and Hospice Agency (X = Date, Y = Severity)

Health Link Home Health and Hospice Agency cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” UHS (X = Date, Y = Severity)

UHS cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/health-link-home-health-agency.jpeg
Health Link Home Health and Hospice Agency
Incidents
https://images.rankiteo.com/companyimages/uhs.jpeg
UHS
Incidents

Date Detected: 10/2023
Type:Ransomware
Attack Vector: Unauthorised Data Access and System Encryption
Blog: Blog

Date Detected: 09/2020
Type:Ransomware
Blog: Blog

FAQ

Both Health Link Home Health and Hospice Agency company and UHS company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

UHS company has historically faced a number of disclosed cyber incidents, whereas Health Link Home Health and Hospice Agency company has not reported any.

In the current year, UHS company and Health Link Home Health and Hospice Agency company have not reported any cyber incidents.

UHS company has confirmed experiencing a ransomware attack, while Health Link Home Health and Hospice Agency company has not reported such incidents publicly.

Neither UHS company nor Health Link Home Health and Hospice Agency company has reported experiencing a data breach publicly.

Neither UHS company nor Health Link Home Health and Hospice Agency company has reported experiencing targeted cyberattacks publicly.

Neither Health Link Home Health and Hospice Agency company nor UHS company has reported experiencing or disclosing vulnerabilities publicly.

Neither Health Link Home Health and Hospice Agency company nor UHS company has publicly disclosed detailed information about the number of their subsidiaries.

UHS company employs more people globally than Health Link Home Health and Hospice Agency company, reflecting its scale as a Hospitals and Health Care.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.

Risk Information
cvss2
Base: 1.7
Severity: LOW
AV:L/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 3.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Campcodes Farm Management System 1.0. Affected by this issue is some unknown functionality. The manipulation results in file and directory information exposure. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X