ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Health PEI is a crown corporation responsible for the operation and delivery of publicly funded health services in Prince Edward Island, Canada. The organization operates hospitals, health centres, public long-term care nursing facilities and community-based programs and services.

Health PEI A.I CyberSecurity Scoring

Health PEI

Company Details

Linkedin ID:

health-pei

Employees number:

1,258

Number of followers:

6,872

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

healthpei.ca

IP Addresses:

0

Company ID:

HEA_9783520

Scan Status:

In-progress

AI scoreHealth PEI Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/health-pei.jpeg
Health PEI Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHealth PEI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/health-pei.jpeg
Health PEI Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Health PEI Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Health PEIBreach8044/2022
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Health PEI suffered a data breach incident after an employee’s laptop was stolen, containing information about more than 4,000 patients and more than 1,200 employees in April 2022. The laptop contained the information about the patients’ visits to PEI emergency departments including the reason for the visit, the diagnosis, and the name of the treating physician. Names, dates of birth, health card numbers, gender, and postal code. It also contained the personal information belonging to more than 1,200 Health PEI long-term care staff was also on the laptop, including names, positions, hours worked and rate of pay. Health PEI sent letters to all those whose information was breached in the incident.

Health PEIBreach100506/2022
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Health P.E.I. suffered from a data breach incident after an employee's laptop was stolen in April. More than 4,000 patients and 1,200 Health P.E.I. employees data exposed including names, dates of birth gender postal code and health card numbers. Health PEI sent letters to all those whose information was breached in the incident. They investigated the incident and de-identified information on laptops and prevent this from happening again.

Government of Prince Edward IslandRansomware75204/2018
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The P.E.I. government’s website was held for ransom. No personal data was breached. The page warned that files on the website were encrypted and no longer accessible. No one could decrypt the files without the attacker’s special decryption service. Ransomware attacks lock access to files unless the victim pays a ransom to have them decrypted. The government was able to restore the website from a backup.

Health PEI
Breach
Severity: 80
Impact: 4
Seen: 4/2022
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Health PEI suffered a data breach incident after an employee’s laptop was stolen, containing information about more than 4,000 patients and more than 1,200 employees in April 2022. The laptop contained the information about the patients’ visits to PEI emergency departments including the reason for the visit, the diagnosis, and the name of the treating physician. Names, dates of birth, health card numbers, gender, and postal code. It also contained the personal information belonging to more than 1,200 Health PEI long-term care staff was also on the laptop, including names, positions, hours worked and rate of pay. Health PEI sent letters to all those whose information was breached in the incident.

Health PEI
Breach
Severity: 100
Impact: 5
Seen: 06/2022
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Health P.E.I. suffered from a data breach incident after an employee's laptop was stolen in April. More than 4,000 patients and 1,200 Health P.E.I. employees data exposed including names, dates of birth gender postal code and health card numbers. Health PEI sent letters to all those whose information was breached in the incident. They investigated the incident and de-identified information on laptops and prevent this from happening again.

Government of Prince Edward Island
Ransomware
Severity: 75
Impact: 2
Seen: 04/2018
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: The P.E.I. government’s website was held for ransom. No personal data was breached. The page warned that files on the website were encrypted and no longer accessible. No one could decrypt the files without the attacker’s special decryption service. Ransomware attacks lock access to files unless the victim pays a ransom to have them decrypted. The government was able to restore the website from a backup.

Ailogo

Health PEI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Health PEI

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Health PEI in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Health PEI in 2025.

Incident Types Health PEI vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Health PEI in 2025.

Incident History — Health PEI (X = Date, Y = Severity)

Health PEI cyber incidents detection timeline including parent company and subsidiaries

Health PEI Company Subsidiaries

SubsidiaryImage

Health PEI is a crown corporation responsible for the operation and delivery of publicly funded health services in Prince Edward Island, Canada. The organization operates hospitals, health centres, public long-term care nursing facilities and community-based programs and services.

Loading...
similarCompanies

Health PEI Similar Companies

Optum

We’re evolving health care so everyone can have the opportunity to live their healthiest life. It’s why we put your unique needs at the heart of everything we do, making it easy and affordable to manage health and well-being. We are delivering the right care how and when it’s needed; providing suppo

Boston Children's Hospital

Boston Children's Hospital is a 404-bed comprehensive center for pediatric health care. As one of the largest pediatric medical centers in the United States, Boston Children's offers a complete range of health care services for children from birth through 21 years of age. (Our services can begin int

Baylor Scott & White Health

With us by your side, there's no stopping you. It's why we're creating a new kind of healthcare at Baylor Scott & White. And we're just getting started. As the largest not-for-profit health system in the state of Texas, Baylor Scott & White promotes the health and well-being of every individual, fa

Homes and communities are where people thrive. We’ve held this belief since our founding in 1967 and have worked to make it reality for the thousands of individuals we serve. We continue that work today and are using innovation, technology, and collaboration across our organization to do more for mo

Helse Sør-Øst RHF

South Eastern Norway Regional health Authority is a merger between the former Eastern and South regional Health Authority. Responsible for secondary healthcare services for the south-eastern parts of Norway 2.5 million people (approx 52% of population) cost containment budget 58 billion Nkr. 100%

R1 RCM

R1 is the leader in healthcare revenue management, helping providers achieve new levels of performance through smart orchestration. A pioneer in the industry, R1 created the first Healthcare Revenue Operating System: a modular, intelligent platform that integrates automation, AI, and human expertise

Hospital Authority

The Hospital Authority (HA) is a statutory body established under the Hospital Authority Ordinance in 1990. We have been responsible for managing Hong Kong's public hospitals services since December 1991. We are accountable to the Hong Kong Special Administrative Region Government through the Secret

Advocate Aurora Health

Advocate Aurora Health and Atrium Health are now Advocate Health – the fifth-largest nonprofit integrated health system in the U.S. Advocate Health is the fifth-largest nonprofit integrated health system in the United States –created from the combination of Advocate Aurora Health and Atrium Health

SSM Health

SSM Health is a Catholic, not-for-profit, fully integrated health system dedicated to advancing innovative, sustainable, and compassionate care for patients and communities throughout the Midwest and beyond. The organization’s 40,000 team members and 13,900 providers are committed to fulfilling SSM

newsone

Health PEI CyberSecurity News

August 26, 2025 07:00 AM
P.E.I. welcomes class of medical students to train on the island

Twenty students will start their medical school journey in Prince Edward Island on Tuesday.

August 18, 2025 07:00 AM
Cybersecurity professor wins two NSF grants, including prestigious CAREER Award

Faculty at UTulsa continue to demonstrate excellence in cybersecurity research with two grants and the prestigious CAREER Award from the...

July 19, 2025 07:00 AM
CyberTitan camp aims to teach P.E.I. students digital literacy and cybersecurity

The P.E.I. IT Alliance is running a youth cybersecurity program for students from Grade 6 right up to the last year of high school.

July 18, 2025 07:00 AM
Startup radar: Seattle founders tackle big problems, from childcare to cybersecurity

From top left, clockwise: Aira Security CEO Mohan Kumar; Concier AI CEO Sunny Pei; Rosie CEO Mitra Raman; Stronghold Labs CEO Pete Schwab;...

June 26, 2025 07:00 AM
P.E.I. investigating two cases of measles in province

The Prince Edward Island Chief Public Health Office is investigating two cases of measles in unvaccinated or partially vaccinated people in the province.

May 09, 2025 07:00 AM
PowerSchool Cybersecurity Event

The Government of Prince Edward Island is informing students, parents, guardians, teachers, and school administration that some of their...

April 11, 2025 07:00 AM
P.E.I. confirms first measles cases since 2013

Prince Edward Island has confirmed cases of measles. The Island's Chief Public Health Office confirmed two cases of measles on Friday.

March 24, 2025 07:00 AM
Daily cataract procedures double since opening of new outpatient clinic: Health PEI

Health PEI says the number of daily cataract surgeries performed on the Island has nearly doubled within the first three months of working...

February 07, 2025 08:00 AM
Cybersecurity breach exposes data of more than 70,000 P.E.I. students, teachers

A cybersecurity breach exposed the data of more than 70000 P.E.I. students and staff, including medical records, personal details and more.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Health PEI CyberSecurity History Information

Official Website of Health PEI

The official website of Health PEI is http://www.healthpei.ca.

Health PEI’s AI-Generated Cybersecurity Score

According to Rankiteo, Health PEI’s AI-generated cybersecurity score is 700, reflecting their Moderate security posture.

How many security badges does Health PEI’ have ?

According to Rankiteo, Health PEI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Health PEI have SOC 2 Type 1 certification ?

According to Rankiteo, Health PEI is not certified under SOC 2 Type 1.

Does Health PEI have SOC 2 Type 2 certification ?

According to Rankiteo, Health PEI does not hold a SOC 2 Type 2 certification.

Does Health PEI comply with GDPR ?

According to Rankiteo, Health PEI is not listed as GDPR compliant.

Does Health PEI have PCI DSS certification ?

According to Rankiteo, Health PEI does not currently maintain PCI DSS compliance.

Does Health PEI comply with HIPAA ?

According to Rankiteo, Health PEI is not compliant with HIPAA regulations.

Does Health PEI have ISO 27001 certification ?

According to Rankiteo,Health PEI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Health PEI

Health PEI operates primarily in the Hospitals and Health Care industry.

Number of Employees at Health PEI

Health PEI employs approximately 1,258 people worldwide.

Subsidiaries Owned by Health PEI

Health PEI presently has no subsidiaries across any sectors.

Health PEI’s LinkedIn Followers

Health PEI’s official LinkedIn profile has approximately 6,872 followers.

NAICS Classification of Health PEI

Health PEI is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Health PEI’s Presence on Crunchbase

No, Health PEI does not have a profile on Crunchbase.

Health PEI’s Presence on LinkedIn

Yes, Health PEI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/health-pei.

Cybersecurity Incidents Involving Health PEI

As of December 19, 2025, Rankiteo reports that Health PEI has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Health PEI has an estimated 31,346 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Health PEI ?

Incident Types: The types of cybersecurity incidents that have occurred include Malware, Ransomware and Breach.

How does Health PEI detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with restored website from backup, and communication strategy with letters sent to all affected individuals, and remediation measures with de-identified information on laptops, and communication strategy with sent letters to all those whose information was breached..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Ransomware Attack on P.E.I. Government Website

Description: The P.E.I. government’s website was held for ransom. The page warned that files on the website were encrypted and no longer accessible. No one could decrypt the files without the attacker’s special decryption service. The government was able to restore the website from a backup.

Type: Ransomware

Motivation: Financial

Incident : Data Breach

Title: Health PEI Data Breach

Description: Health PEI suffered a data breach incident after an employee’s laptop was stolen, containing information about more than 4,000 patients and more than 1,200 employees in April 2022.

Date Detected: April 2022

Type: Data Breach

Attack Vector: Theft of Laptop

Incident : Data Breach

Title: Health P.E.I. Data Breach

Description: Health P.E.I. suffered from a data breach incident after an employee's laptop was stolen in April. More than 4,000 patients and 1,200 Health P.E.I. employees data exposed including names, dates of birth, gender, postal code, and health card numbers.

Date Detected: April

Type: Data Breach

Attack Vector: Laptop Theft

Motivation: Theft

Incident : Virus

Title: Virus Infection on Government Computer Network

Description: A virus was discovered on government computer network and was active for 90 minutes. A very small amount of the government's server infrastructure became encrypted during the incident, but all the affected data is backed up and protected. There were some small service interruptions, most applied to internal government services.

Type: Virus

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware GOV211111622

Data Compromised: No

Systems Affected: Website

Incident : Data Breach HEA14717822

Data Compromised: Patients' visit details to pei emergency departments, Personal information of patients and staff

Incident : Data Breach HEA20719822

Data Compromised: Names, Dates of birth, Gender, Postal code, Health card numbers

Systems Affected: Laptop

Incident : Virus GOV1848231222

Systems Affected: Government's server infrastructure

Downtime: 90 minutes

Operational Impact: Small service interruptions

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Visit Details To Pei Emergency Departments, Personal Information, , Personal Information, Health Information and .

Which entities were affected by each incident ?

Incident : Ransomware GOV211111622

Entity Name: P.E.I. Government

Entity Type: Government

Industry: Public Sector

Location: P.E.I.

Incident : Data Breach HEA14717822

Entity Name: Health PEI

Entity Type: Healthcare Organization

Industry: Healthcare

Location: Prince Edward Island

Customers Affected: More than 4,000 patients, More than 1,200 employees

Incident : Data Breach HEA20719822

Entity Name: Health P.E.I.

Entity Type: Healthcare

Industry: Healthcare

Location: Prince Edward Island

Customers Affected: 4,000 patients, 1,200 employees

Incident : Virus GOV1848231222

Entity Name: Government

Entity Type: Government

Industry: Government

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware GOV211111622

Remediation Measures: Restored website from backup

Incident : Data Breach HEA14717822

Communication Strategy: Letters sent to all affected individuals

Incident : Data Breach HEA20719822

Remediation Measures: De-identified information on laptops

Communication Strategy: Sent letters to all those whose information was breached

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach HEA14717822

Type of Data Compromised: Visit details to pei emergency departments, Personal information

Number of Records Exposed: More than 4,000 patients, More than 1,200 employees

Personally Identifiable Information: NamesDates of birthHealth card numbersGenderPostal codePositionsHours workedRate of pay

Incident : Data Breach HEA20719822

Type of Data Compromised: Personal information, Health information

Number of Records Exposed: 4,000 patients, 1,200 employees

Sensitivity of Data: High

Personally Identifiable Information: NamesDates of BirthGenderPostal CodeHealth Card Numbers

Incident : Virus GOV1848231222

Data Encryption: Yes

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restored website from backup, De-identified information on laptops, .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware GOV211111622

Data Encryption: Yes

Incident : Virus GOV1848231222

Data Encryption: Yes

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Letters sent to all affected individuals and Sent Letters To All Those Whose Information Was Breached.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach HEA20719822

Corrective Actions: De-Identified Information On Laptops,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: De-Identified Information On Laptops, .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on April 2022.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were No, Patients' visit details to PEI emergency departments, Personal information of patients and staff, , Names, Dates of Birth, Gender, Postal Code, Health Card Numbers and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Laptop and Government's server infrastructure.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Dates of Birth, No, Postal Code, Gender, Personal information of patients and staff, Health Card Numbers and Patients' visit details to PEI emergency departments.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.4K.

cve

Latest Global CVEs (Not Company-Specific)

Description

Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.

Risk Information
cvss3
Base: 4.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Description

Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Description

Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator.

Risk Information
cvss3
Base: 6.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=health-pei' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge