Company Details
health-resources-in-action
257
7,454
92312
hria.org
8
HEA_3294909
Completed

Health Resources in Action (HRiA) Company CyberSecurity Posture
hria.orgHealth Resources in Action is a non-profit organization working to improve and reimagine public health. We connect, consult, and collaborate to solve complex challenges of access and equity in our health and social systems. Together with our partners, clients, and collaborators, we create actionable solutions so that all people can thrive.
Company Details
health-resources-in-action
257
7,454
92312
hria.org
8
HEA_3294909
Completed
Between 700 and 749

HRA Global Score (TPRM)XXXX

Description: Health Resources in Action, Inc. suffered a data breach where unauthorized actors gained access to an email account and SharePoint files between **March 29, 2024, and April 24, 2024**. The incident exposed the **personal information of 3 individuals**, including **Social Security numbers (SSNs)**, a highly sensitive data type often targeted for identity theft. While the breach was limited in scale (affecting only three people), the exposure of SSNs elevates the risk of long-term harm, such as financial fraud or identity misuse. In response, the company offered **24 months of identity theft protection services via Experian** to mitigate potential damages. The breach did not involve ransomware, mass customer data leaks, or operational disruptions, but the compromise of **employee or associated individuals' SSNs** suggests internal data exposure with significant privacy implications. The incident highlights vulnerabilities in email and file-sharing systems, which are common entry points for cyber intrusions.


No incidents recorded for Health Resources in Action (HRiA) in 2025.
No incidents recorded for Health Resources in Action (HRiA) in 2025.
No incidents recorded for Health Resources in Action (HRiA) in 2025.
HRA cyber incidents detection timeline including parent company and subsidiaries

Health Resources in Action is a non-profit organization working to improve and reimagine public health. We connect, consult, and collaborate to solve complex challenges of access and equity in our health and social systems. Together with our partners, clients, and collaborators, we create actionable solutions so that all people can thrive.


The mission of the New Jersey Environmental Health Association is to support the professional growth of environmental health specialists, provide a unified and informed voice in the development of public health practice and policy, and enhance the ability of members to aptly promote environmental an

One Health is the idea of breaking down the barriers between Human Medicine, Veterinary Medicine and Environmental Science to allow for a better understanding of health issues. As WOHC, we seek to implement this approach on the Western University campus through various events that promote scientific

The National Health Care for the Homeless Council is the premier national organization working at the nexus of homelessness and health care. Grounded in human rights and social justice, the NHCHC mission is to build an equitable, high-quality health care system through training, research, and advo

Maine Family Planning is the state’s first and largest reproductive rights organization, providing leadership in four key areas: ensuring affordable quality reproductive health care services statewide, providing abortion care services and training for residents and physicians, building a statewide v

Counter Tools empowers communities to become healthier places for all. With our partners, we advance place-based public health by enacting and enforcing policy, systems, and environmental interventions that promote health equity across communities. We aim to reduce the detrimental impact of unhea

The Harvard Global Orthopaedics Collaborative (HGOC) is a group of Harvard-affiliated orthopaedic surgery faculty and trainees who share a passion for improving access to musculoskeletal health care globally. We engage in clinical research, surgical education, care delivery, and health systems devel
.png)
Third Win After 2022 and 2023 Recognition. SINGAPORE, Nov. 28, 2025 /PRNewswire/ — Ensign InfoSecurity, Asia Pacific's largest pure-play,...
Two years ago the local authority for the Outer Hebrides suffered a cyber incursion that impacted delivery of frontline services and...
Rhode Island Emergency Management Agency said its CodeRED notification system is down after a national cybersecurity incident.
ServiceNow Inc. is reportedly in advanced talks to acquire Veza Inc., a startup with an identity management platform of the same name.
A 15-year-old known online as “Rey” has been allegedly identified as a key figure in Scattered LAPSUS$ Hunters (SLSH), a hacking group said...
Thinking about whether Palo Alto Networks is a buy right now? If you have even a hint of curiosity about the stock's value,...
By Juliet ETEFE ([email protected]) Virtual Infosec Africa (VIA), in partnership with global cybersecurity firm Exabeam, has launched Ghana's...
Mohit Chawla, Deputy Inspector General (DIG) of Himachal Pradesh Police, has been honoured with the Chief Information Security Officer...
This list of curated articles highlights cybersecurity incidents affecting Pierce County. They emphasize vulnerabilities and breaches that...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Health Resources in Action (HRiA) is http://www.hria.org.
According to Rankiteo, Health Resources in Action (HRiA)’s AI-generated cybersecurity score is 709, reflecting their Moderate security posture.
According to Rankiteo, Health Resources in Action (HRiA) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Health Resources in Action (HRiA) is not certified under SOC 2 Type 1.
According to Rankiteo, Health Resources in Action (HRiA) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Health Resources in Action (HRiA) is not listed as GDPR compliant.
According to Rankiteo, Health Resources in Action (HRiA) does not currently maintain PCI DSS compliance.
According to Rankiteo, Health Resources in Action (HRiA) is not compliant with HIPAA regulations.
According to Rankiteo,Health Resources in Action (HRiA) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Health Resources in Action (HRiA) operates primarily in the Public Health industry.
Health Resources in Action (HRiA) employs approximately 257 people worldwide.
Health Resources in Action (HRiA) presently has no subsidiaries across any sectors.
Health Resources in Action (HRiA)’s official LinkedIn profile has approximately 7,454 followers.
Health Resources in Action (HRiA) is classified under the NAICS code 92312, which corresponds to Administration of Public Health Programs.
No, Health Resources in Action (HRiA) does not have a profile on Crunchbase.
Yes, Health Resources in Action (HRiA) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/health-resources-in-action.
As of November 28, 2025, Rankiteo reports that Health Resources in Action (HRiA) has experienced 1 cybersecurity incidents.
Health Resources in Action (HRiA) has an estimated 279 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with experian (identity theft protection)..
Title: Health Resources in Action, Inc. Data Breach (March–April 2024)
Description: The Maine Attorney General's Office reported that Health Resources in Action, Inc. experienced a data breach involving unauthorized access to an email account and SharePoint files from March 29, 2024, to April 24, 2024. The breach potentially affected the personal information of 3 individuals, including Social Security numbers. Identity theft protection services were offered for 24 months through Experian.
Type: Data Breach
Attack Vector: Unauthorized Access (Email & SharePoint)
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security numbers
Systems Affected: Email accountSharePoint files
Identity Theft Risk: High (SSNs exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii) and .

Entity Name: Health Resources in Action, Inc.
Entity Type: Non-profit Organization
Industry: Healthcare/Public Health
Customers Affected: 3 individuals

Third Party Assistance: Experian (Identity Theft Protection).
Third-Party Assistance: The company involves third-party assistance in incident response through Experian (identity theft protection), .

Type of Data Compromised: Personally identifiable information (pii)
Number of Records Exposed: 3
Sensitivity of Data: High (SSNs included)
Personally Identifiable Information: Social Security numbers

Regulatory Notifications: Maine Attorney General's Office

Source: Maine Attorney General's Office
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Attorney General's Office.

Customer Advisories: Identity theft protection services offered for 24 months via Experian
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Identity theft protection services offered for 24 months via Experian.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian (Identity Theft Protection), .
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident was Email accountSharePoint files.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was experian (identity theft protection), .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Social Security numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.0.
Most Recent Source: The most recent source of information about an incident is Maine Attorney General's Office.
Most Recent Customer Advisory: The most recent customer advisory issued was an Identity theft protection services offered for 24 months via Experian.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.