Comparison Overview

Hopkins Public Schools

VS

Zionsville Community Schools

Hopkins Public Schools

1001 Highway 7, None, Hopkins, Minnesota, US, 55305
Last Update: 2025-07-27 (UTC)

Hopkins Public Schools is an award-winning school district with a K-12 population of about 6,800 students, serving the city of Hopkins, most of Minnetonka, about half of Golden Valley, and portions of Eden Prairie, Edina, Plymouth, and St. Louis Park. Hopkins Public Schools has a long history of innovation, excellence, and above all, doing what is right for students. That’s why we are embarking on Vision 2031 — a vision of innovation to reimagine Hopkins Public Schools starting from the ground up. Hopkins Public Schools is working to set the standard for the future of educating students through a culturally responsive and anti-racist lens. We are fearless problem solvers who know that great ideas can come from anyone, anywhere. In Hopkins, our core values represent how we show up to work every day. The more we are able to embody and embrace our core values, the more successful we will be in our goal of reaching Vision 2031 and truly moving from Great to World Class. The values that define us are: • Authentic Inclusivity • Intentionally Adventurous • Optimistic Innovation • Humility of Heart • Vigilant Equity • Love.

NAICS: 6111
NAICS Definition: Elementary and Secondary Schools
Employees: 431
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Zionsville Community Schools

900 Mulberry Street, Zionsville, IN, 46077, US
Last Update: 2025-03-05 (UTC)
Between 700 and 749

Zionsville Community Schools is a public school system serving kindergarten through 12th grade students in Eagle and Union townships in Boone County, Indiana. Our Strong in Every Way initiative is part of a culture built around helping our youth grow and develop. We appreciate our families who partner with us to help build students' capacity for collaboration, problem solving, self-regulation and other non-cognitive skills essential to life success. The ZCS Mission: Zionsville Community Schools provide customized 21st century experiences that ensure maximum student growth leading to productive citizenship in the world community.

NAICS: 6111
NAICS Definition: Elementary and Secondary Schools
Employees: 611
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/hopkins-public-schools-270.jpeg
Hopkins Public Schools
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/zionsville-community-schools.jpeg
Zionsville Community Schools
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Hopkins Public Schools
100%
Compliance Rate
0/4 Standards Verified
Zionsville Community Schools
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Primary and Secondary Education Industry Average (This Year)

No incidents recorded for Hopkins Public Schools in 2025.

Incidents vs Primary and Secondary Education Industry Average (This Year)

No incidents recorded for Zionsville Community Schools in 2025.

Incident History — Hopkins Public Schools (X = Date, Y = Severity)

Hopkins Public Schools cyber incidents detection timeline including parent company and subsidiaries

Incident History — Zionsville Community Schools (X = Date, Y = Severity)

Zionsville Community Schools cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/hopkins-public-schools-270.jpeg
Hopkins Public Schools
Incidents

Date Detected: 4/2020
Type:Ransomware
Blog: Blog
https://images.rankiteo.com/companyimages/zionsville-community-schools.jpeg
Zionsville Community Schools
Incidents

Date Detected: 04/2021
Type:Breach
Blog: Blog

FAQ

Zionsville Community Schools company demonstrates a stronger AI Cybersecurity Score compared to Hopkins Public Schools company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Hopkins Public Schools and Zionsville Community Schools have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Zionsville Community Schools company and Hopkins Public Schools company have not reported any cyber incidents.

Hopkins Public Schools company has confirmed experiencing a ransomware attack, while Zionsville Community Schools company has not reported such incidents publicly.

Zionsville Community Schools company has disclosed at least one data breach, while Hopkins Public Schools company has not reported such incidents publicly.

Neither Zionsville Community Schools company nor Hopkins Public Schools company has reported experiencing targeted cyberattacks publicly.

Neither Hopkins Public Schools company nor Zionsville Community Schools company has reported experiencing or disclosing vulnerabilities publicly.

Neither Hopkins Public Schools nor Zionsville Community Schools holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Hopkins Public Schools company nor Zionsville Community Schools company has publicly disclosed detailed information about the number of their subsidiaries.

Zionsville Community Schools company employs more people globally than Hopkins Public Schools company, reflecting its scale as a Primary and Secondary Education.

Neither Hopkins Public Schools nor Zionsville Community Schools holds SOC 2 Type 1 certification.

Neither Hopkins Public Schools nor Zionsville Community Schools holds SOC 2 Type 2 certification.

Neither Hopkins Public Schools nor Zionsville Community Schools holds ISO 27001 certification.

Neither Hopkins Public Schools nor Zionsville Community Schools holds PCI DSS certification.

Neither Hopkins Public Schools nor Zionsville Community Schools holds HIPAA certification.

Neither Hopkins Public Schools nor Zionsville Community Schools holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X