Comparison Overview

Imago Relationships International

VS

Children's Behavioral Health Services

Imago Relationships International

2365 Harrodsburg Road, Suite A325, Lexington, KY, 40504, US
Last Update: 2026-01-23

Imago Relationship Therapy (IRT) was created by Dr. Harville Hendrix, author of the best-selling “Getting the Love You Want: A Guide For Couples (1988).” The term Imago is Latin for “image,”and refers to the “unconscious image of familiar love.” Simply put, there is often a connection between the frustrations experienced in adult relationships and early childhood experiences. For example: If you frequently felt criticized as a child, you will likely be sensitive to any criticism from, and feel criticized often by your partner. Likewise, if you felt abandoned, smothered, neglected, etc., these feelings will come up in your marriage/committed relationships. Most people face only a few of these “core issues,” but they typically arise again and again within partnerships. This can overshadow all that is good in the relationship, leaving people to wonder if they have chosen the right mate. So here is the good news: When you can understand each other’s feelings and “childhood wounds” more empathically, you can begin to heal yourself and your relationship, and move toward a more conscious relationship. Imago Relationships International can help you do this by teaching the “Imago Dialogue” process, and helping you move from blame and reactivity to understanding and empathy. With this process,you can transform conflicts into opportunities for healing and growth, and connect more deeply and lovingly with your intimate partner.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 32
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Children's Behavioral Health Services

1415 E US Highway 169, Grand Rapids, MN, 55744, US
Last Update: 2026-01-22
Between 750 and 799

Children's Behavioral Health Services is the mental health division of The Rock HHC Inc. We started our mission in 2003 as a Personal Care Company providing services to all walks of life throughout Itasca, St. Louis, and many surrounding counties in Northern Minnesota. We have offices in Grand Rapids and Virginia MN. Our Mental Health division is based out of our Grand Rapids offices located at 1415 East US Highway 169. Here a full range of community-based mental health services provides effective, flexible and individualized treatment solutions that support the needs of growing children and their families. Our highly trained and experienced staff is dedicated to providing responsive, culturally competent services in the most natural, least restrictive setting possible. We encourage full participation of family members and work to coordinate with the entire child-service system of care.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 81
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/imago-relationships-international.jpeg
Imago Relationships International
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/children's-behavioral-health-services.jpeg
Children's Behavioral Health Services
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Imago Relationships International
100%
Compliance Rate
0/4 Standards Verified
Children's Behavioral Health Services
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Imago Relationships International in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Children's Behavioral Health Services in 2026.

Incident History — Imago Relationships International (X = Date, Y = Severity)

Imago Relationships International cyber incidents detection timeline including parent company and subsidiaries

Incident History — Children's Behavioral Health Services (X = Date, Y = Severity)

Children's Behavioral Health Services cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/imago-relationships-international.jpeg
Imago Relationships International
Incidents

No Incident

https://images.rankiteo.com/companyimages/children's-behavioral-health-services.jpeg
Children's Behavioral Health Services
Incidents

No Incident

FAQ

Children's Behavioral Health Services company demonstrates a stronger AI Cybersecurity Score compared to Imago Relationships International company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Children's Behavioral Health Services company has disclosed a higher number of cyber incidents compared to Imago Relationships International company.

In the current year, Children's Behavioral Health Services company and Imago Relationships International company have not reported any cyber incidents.

Neither Children's Behavioral Health Services company nor Imago Relationships International company has reported experiencing a ransomware attack publicly.

Neither Children's Behavioral Health Services company nor Imago Relationships International company has reported experiencing a data breach publicly.

Neither Children's Behavioral Health Services company nor Imago Relationships International company has reported experiencing targeted cyberattacks publicly.

Neither Imago Relationships International company nor Children's Behavioral Health Services company has reported experiencing or disclosing vulnerabilities publicly.

Neither Imago Relationships International nor Children's Behavioral Health Services holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Imago Relationships International company nor Children's Behavioral Health Services company has publicly disclosed detailed information about the number of their subsidiaries.

Children's Behavioral Health Services company employs more people globally than Imago Relationships International company, reflecting its scale as a Mental Health Care.

Neither Imago Relationships International nor Children's Behavioral Health Services holds SOC 2 Type 1 certification.

Neither Imago Relationships International nor Children's Behavioral Health Services holds SOC 2 Type 2 certification.

Neither Imago Relationships International nor Children's Behavioral Health Services holds ISO 27001 certification.

Neither Imago Relationships International nor Children's Behavioral Health Services holds PCI DSS certification.

Neither Imago Relationships International nor Children's Behavioral Health Services holds HIPAA certification.

Neither Imago Relationships International nor Children's Behavioral Health Services holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.