Company Details
jimmy-john's
18,724
47,470
7225
jimmyjohns.com
0
JIM_2235471
In-progress

Jimmy John's Company CyberSecurity Posture
jimmyjohns.comTHE SANDWICH OF SANDWICHES℠ At Jimmy John's, we don't make sandwiches. We make The Sandwich of Sandwiches℠. We use fresh vegetables because we don't hate salads, we just feel bad for them. We hand-slice our provolone cheese and meats in-house every day, because packaged pre-sliced meats doesn't have the same ring to it. And we bake bread all day, every day because stale bread isn't bread, it's... croutons. The flavors of fresh-veggies, combined with hand-sliced meats and fresh-baked bread is what makes a Jimmy John's sandwich The Sandwich of Sandwiches℠. For more information, visit jimmyjohns.com and InspireBrands.com. For careers, visit our careers site: careers.jimmyjohns.com Connect with us on social media: instagram.com/jimmyjohns facebook.com/jimmyjohns twitter.com/jimmyjohns tiktok.com/@jimmyjohns pinterest.com/jimmyjohns www.youtube.com/user/jimmyjohns www.InspireBrands.com This profile is for Jimmy John's Headquarters. Each Jimmy John's is independently owned and operated under a franchise agreement with Jimmy John's Franchise, LLC, franchisor of the JIMMY JOHN'S system. Any questions regarding employment must be directed to the franchise owner/operator. Jimmy John’s Franchise, LLC does not have access to franchisees’ employment records or specific rules for employment as defined by the franchisees.
Company Details
jimmy-john's
18,724
47,470
7225
jimmyjohns.com
0
JIM_2235471
In-progress
Between 750 and 799

Jimmy John's Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Jimmy John’s experienced a payment card security incident affecting approximately 216 stores. Unauthorized access occurred from June 16, 2014 to September 5, 2014, compromising credit and debit card data, including card numbers and potentially cardholder names, verification codes, and expiration dates. The report was made on September 24, 2014.


No incidents recorded for Jimmy John's in 2025.
No incidents recorded for Jimmy John's in 2025.
No incidents recorded for Jimmy John's in 2025.
Jimmy John's cyber incidents detection timeline including parent company and subsidiaries

THE SANDWICH OF SANDWICHES℠ At Jimmy John's, we don't make sandwiches. We make The Sandwich of Sandwiches℠. We use fresh vegetables because we don't hate salads, we just feel bad for them. We hand-slice our provolone cheese and meats in-house every day, because packaged pre-sliced meats doesn't have the same ring to it. And we bake bread all day, every day because stale bread isn't bread, it's... croutons. The flavors of fresh-veggies, combined with hand-sliced meats and fresh-baked bread is what makes a Jimmy John's sandwich The Sandwich of Sandwiches℠. For more information, visit jimmyjohns.com and InspireBrands.com. For careers, visit our careers site: careers.jimmyjohns.com Connect with us on social media: instagram.com/jimmyjohns facebook.com/jimmyjohns twitter.com/jimmyjohns tiktok.com/@jimmyjohns pinterest.com/jimmyjohns www.youtube.com/user/jimmyjohns www.InspireBrands.com This profile is for Jimmy John's Headquarters. Each Jimmy John's is independently owned and operated under a franchise agreement with Jimmy John's Franchise, LLC, franchisor of the JIMMY JOHN'S system. Any questions regarding employment must be directed to the franchise owner/operator. Jimmy John’s Franchise, LLC does not have access to franchisees’ employment records or specific rules for employment as defined by the franchisees.

Waffle House has been serving Good Food Fast® since 1955. We started in one restaurant serving Avondale Estates, GA, and then grew into a national brand with more than 1,900 restaurants in 25 states providing career paths to 40,000 + employees. The love and devotion of our customer base helped bui

Somos um grande ecossistema de restaurantes que reúne marcas internacionais como Burger King®, Popeyes®, Starbucks® e Subway®. E, por trás de cada receita de sucesso, estão os Zampers: gente que faz acontecer, que joga junto e que deixa sua marca todos os dias. Aqui, a gente acredita que o verdad

Made with an Australian flair, born under the Tampa sun. Outback Steakhouse is an Australian-inspired restaurant providing high quality delicious food with Aussie hospitality since 1988. Our success is based on our belief that if we take care of Our People, the institution of Outback will take care

With over 500+ restaurants across the United States, LongHorn Steakhouse has a passion for steak done the right way. Our legendary food sets us apart, but it’s our people who bring LongHorn to life. We strive to create a place where team members feel valued, listened to and appreciated. We offer of
Dallas-based Brinker International, Inc. is one of the world’s leading casual dining restaurant companies. Founded in 1975, Brinker owns, operates or franchises more than 1,600 restaurants across 31 countries and two territories under the names Chili’s® Grill & Bar and Maggiano’s Little Italy®. O

We’re KFC. The iconic, brand making world-famous finger lickin’ good fried chicken since 1952. Our unrivaled people and culture are the true heart and soul of our brand. It’s where our people promise comes to life every day. Where our employees can be their best selves, make a difference, and have f

Papa Johns seeks people who have an entrepreneurial spirit and share our philosophy for success. Hands-on training, a clean and safe work environment, quality business practices, advancement opportunities and meaningful work combine to produce not only the best pizza, but also the best team members!

On Aug. 8, 1950, an adventurous and determined entrepreneur named Harmon Dobson opened up the world’s first Whataburger on Ayers Street in Corpus Christi, Texas. He had a simple goal: to serve a burger so big it took two hands to hold and so good that after one bite customers would say, “What a burg
With 58,000 employees and more than 700 restaurants in the United States and Canada, and a growing international presence, Red Lobster is the world’s largest seafood restaurant company. Our vision is to be where the world goes for seafood now and for generations. Red Lobster is an innovative, v
.png)
Halifax's information technology (IT) system has addressed many of the recommendations in the municipality's auditor general report from...
Rubrik's Preemptive Recovery Engine lies at the center of the collaboration. The initiative will deploy AWS's generative AI service,...
Stellantis STLAM.MI detected unauthorized access to a third-party service provider's platform that supports its North American customer...
Nova Scotia Power, which was originally ordered to provide a litany of information on the cybersecurity breach no later than Aug.
A preliminary investigation found no signs that the outage was cybersecurity-related, said Jeff Robertson, with Comtech Telecommunications,...
A wave of personal data breaches at global luxury brands in Korea, from Louis Vuitton and Dior, and domestic restaurant chains like Subway...
As AI transforms cybersecurity, brands must prioritize clarity, transparency and human connection over technical specs alone.
Catch up on Louisville's biggest tech and AI breakthroughs, from new partnerships to cybersecurity threats. Stay ahead with this month's top...
Nova Scotia Power has confirmed it was the “victim of a sophisticated ransomware attack,” and data stolen from its systems has been published.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Jimmy John's is http://www.jimmyjohns.com.
According to Rankiteo, Jimmy John's’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, Jimmy John's currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Jimmy John's is not certified under SOC 2 Type 1.
According to Rankiteo, Jimmy John's does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Jimmy John's is not listed as GDPR compliant.
According to Rankiteo, Jimmy John's does not currently maintain PCI DSS compliance.
According to Rankiteo, Jimmy John's is not compliant with HIPAA regulations.
According to Rankiteo,Jimmy John's is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Jimmy John's operates primarily in the Restaurants industry.
Jimmy John's employs approximately 18,724 people worldwide.
Jimmy John's presently has no subsidiaries across any sectors.
Jimmy John's’s official LinkedIn profile has approximately 47,470 followers.
Jimmy John's is classified under the NAICS code 7225, which corresponds to Restaurants and Other Eating Places.
Yes, Jimmy John's has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/jimmy-johns-gourmet-sandwiches.
Yes, Jimmy John's maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jimmy-john's.
As of December 23, 2025, Rankiteo reports that Jimmy John's has experienced 1 cybersecurity incidents.
Jimmy John's has an estimated 4,863 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credit And Debit Card Data, Card Numbers, Cardholder Names, Verification Codes, Expiration Dates and .

Entity Name: Jimmy John's
Entity Type: Restaurant Chain
Industry: Food and Beverage
Location: Multiple
Size: Approximately 216 stores

Type of Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates
Sensitivity of Data: High
Personally Identifiable Information: Cardholder names

Source: California Office of the Attorney General
Date Accessed: 2014-09-24
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-09-24.
Most Recent Incident Detected: The most recent incident detected was on 2014-09-24.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-09-24.
Most Significant Data Compromised: The most significant data compromised in an incident were Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Verification codes, Credit and debit card data, Expiration dates, Cardholder names and Card numbers.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.