Comparison Overview

Intermountain Health

VS

Access Healthcare Services

Intermountain Health

5245 South College Drive, Murray , UT, 84123, US
Last Update: 2025-12-05

As the largest nonprofit health system in the Mountain West, Intermountain Health is dedicated to creating healthier communities and helping our patients and caregivers thrive. It’s time to think of health in a whole new way, and by partnering with our patients and communities, providing expert care closer to home, and making great health more affordable, we can help more people get and stay well. We proudly invest back into improving the care we deliver, and our pioneering research is making healthcare more personalized, effective, and affordable. Serving patients and communities throughout the Mountain West, primarily in Colorado, Utah, Montana, Nevada, Idaho, and Wyoming, Intermountain includes 34 hospitals, 400+ clinics, a medical group, affiliate networks, homecare, telehealth, health insurance plans, and other services - along with wholly owned subsidiaries including Select Health, Castell, Tellica Imaging, and Classic Air Medical.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 32,995
Subsidiaries: 3
12-month incidents
0
Known data breaches
1
Attack type number
1

Access Healthcare Services

4300 Alpha Rd, Dallas, Texas, 75244, US
Last Update: 2025-12-01

Access Healthcare provides business process outsourcing, application services, and robotic process automation tools to hospitals, health systems, providers, payers, and related service providers. We operate from 20 delivery centers across nine cities in the US, India, and the Philippines, and our 27,000+ staff is committed to bringing revenue cycle excellence to our customers by leveraging technology, emerging best practices, and global delivery. Based in Dallas, TX, we support over 500,000 healthcare providers through 100+ clients, serving 80+ specialties, process over $70 billion of A/R annually, and ascribe medical codes to over 29 million charts annually. Access Healthcare has developed a proprietary robotic process automation platform that has implemented 3,500+ virtual bots across our service verticals which helps organizations gain greater efficiency. Access Healthcare is HITRUST, PCI DSS, SOC, ISO 27001, and ISO 9001 certified, providing security, availability, and confidentiality of sensitive health information. Our people program, integrated processes, and proven track record with our client base have earned us the “Leader” and “Star Performer” awards by Everest Group’s Healthcare Provider BPO Peak Matrix. To learn how Access Healthcare can help your organization boost its financial performance, visit https://www.accesshealthcare.com

NAICS: 62
NAICS Definition:
Employees: 13,328
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/intermountain-healthcare.jpeg
Intermountain Health
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/accesshealthcare.jpeg
Access Healthcare Services
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Intermountain Health
100%
Compliance Rate
0/4 Standards Verified
Access Healthcare Services
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Intermountain Health in 2025.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Access Healthcare Services in 2025.

Incident History — Intermountain Health (X = Date, Y = Severity)

Intermountain Health cyber incidents detection timeline including parent company and subsidiaries

Incident History — Access Healthcare Services (X = Date, Y = Severity)

Access Healthcare Services cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/intermountain-healthcare.jpeg
Intermountain Health
Incidents

Date Detected: 4/2021
Type:Breach
Attack Vector: Hacking
Blog: Blog
https://images.rankiteo.com/companyimages/accesshealthcare.jpeg
Access Healthcare Services
Incidents

No Incident

FAQ

Intermountain Health company demonstrates a stronger AI Cybersecurity Score compared to Access Healthcare Services company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Intermountain Health company has historically faced a number of disclosed cyber incidents, whereas Access Healthcare Services company has not reported any.

In the current year, Access Healthcare Services company and Intermountain Health company have not reported any cyber incidents.

Neither Access Healthcare Services company nor Intermountain Health company has reported experiencing a ransomware attack publicly.

Intermountain Health company has disclosed at least one data breach, while the other Access Healthcare Services company has not reported such incidents publicly.

Neither Access Healthcare Services company nor Intermountain Health company has reported experiencing targeted cyberattacks publicly.

Neither Intermountain Health company nor Access Healthcare Services company has reported experiencing or disclosing vulnerabilities publicly.

Neither Intermountain Health nor Access Healthcare Services holds any compliance certifications.

Neither company holds any compliance certifications.

Intermountain Health company has more subsidiaries worldwide compared to Access Healthcare Services company.

Intermountain Health company employs more people globally than Access Healthcare Services company, reflecting its scale as a Hospitals and Health Care.

Neither Intermountain Health nor Access Healthcare Services holds SOC 2 Type 1 certification.

Neither Intermountain Health nor Access Healthcare Services holds SOC 2 Type 2 certification.

Neither Intermountain Health nor Access Healthcare Services holds ISO 27001 certification.

Neither Intermountain Health nor Access Healthcare Services holds PCI DSS certification.

Neither Intermountain Health nor Access Healthcare Services holds HIPAA certification.

Neither Intermountain Health nor Access Healthcare Services holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.3
Severity: LOW
AV:N/AC:L/Au:M/C:N/I:P/A:N
cvss3
Base: 2.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X