ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

THE SANDWICH OF SANDWICHES℠ At Jimmy John's, we don't make sandwiches. We make The Sandwich of Sandwiches℠. We use fresh vegetables because we don't hate salads, we just feel bad for them. We hand-slice our provolone cheese and meats in-house every day, because packaged pre-sliced meats doesn't have the same ring to it. And we bake bread all day, every day because stale bread isn't bread, it's... croutons. The flavors of fresh-veggies, combined with hand-sliced meats and fresh-baked bread is what makes a Jimmy John's sandwich The Sandwich of Sandwiches℠. For more information, visit jimmyjohns.com and InspireBrands.com. For careers, visit our careers site: careers.jimmyjohns.com Connect with us on social media: instagram.com/jimmyjohns facebook.com/jimmyjohns twitter.com/jimmyjohns tiktok.com/@jimmyjohns pinterest.com/jimmyjohns www.youtube.com/user/jimmyjohns www.InspireBrands.com This profile is for Jimmy John's Headquarters. Each Jimmy John's is independently owned and operated under a franchise agreement with Jimmy John's Franchise, LLC, franchisor of the JIMMY JOHN'S system. Any questions regarding employment must be directed to the franchise owner/operator. Jimmy John’s Franchise, LLC does not have access to franchisees’ employment records or specific rules for employment as defined by the franchisees.

Jimmy John's A.I CyberSecurity Scoring

Jimmy John's

Company Details

Linkedin ID:

jimmy-john's

Employees number:

18,724

Number of followers:

47,470

NAICS:

7225

Industry Type:

Restaurants

Homepage:

jimmyjohns.com

IP Addresses:

0

Company ID:

JIM_2235471

Scan Status:

In-progress

AI scoreJimmy John's Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/jimmy-john's.jpeg
Jimmy John's Restaurants
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreJimmy John's Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/jimmy-john's.jpeg
Jimmy John's Restaurants
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Jimmy John's Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Jimmy John's Franchises LLCCyber Attack6026/2014
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The California Office of the Attorney General reported that Jimmy John’s experienced a payment card security incident affecting approximately 216 stores. Unauthorized access occurred from June 16, 2014 to September 5, 2014, compromising credit and debit card data, including card numbers and potentially cardholder names, verification codes, and expiration dates. The report was made on September 24, 2014.

Jimmy John's Franchises LLC
Cyber Attack
Severity: 60
Impact: 2
Seen: 6/2014
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: The California Office of the Attorney General reported that Jimmy John’s experienced a payment card security incident affecting approximately 216 stores. Unauthorized access occurred from June 16, 2014 to September 5, 2014, compromising credit and debit card data, including card numbers and potentially cardholder names, verification codes, and expiration dates. The report was made on September 24, 2014.

Ailogo

Jimmy John's Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Jimmy John's

Incidents vs Restaurants Industry Average (This Year)

No incidents recorded for Jimmy John's in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Jimmy John's in 2025.

Incident Types Jimmy John's vs Restaurants Industry Avg (This Year)

No incidents recorded for Jimmy John's in 2025.

Incident History — Jimmy John's (X = Date, Y = Severity)

Jimmy John's cyber incidents detection timeline including parent company and subsidiaries

Jimmy John's Company Subsidiaries

SubsidiaryImage

THE SANDWICH OF SANDWICHES℠ At Jimmy John's, we don't make sandwiches. We make The Sandwich of Sandwiches℠. We use fresh vegetables because we don't hate salads, we just feel bad for them. We hand-slice our provolone cheese and meats in-house every day, because packaged pre-sliced meats doesn't have the same ring to it. And we bake bread all day, every day because stale bread isn't bread, it's... croutons. The flavors of fresh-veggies, combined with hand-sliced meats and fresh-baked bread is what makes a Jimmy John's sandwich The Sandwich of Sandwiches℠. For more information, visit jimmyjohns.com and InspireBrands.com. For careers, visit our careers site: careers.jimmyjohns.com Connect with us on social media: instagram.com/jimmyjohns facebook.com/jimmyjohns twitter.com/jimmyjohns tiktok.com/@jimmyjohns pinterest.com/jimmyjohns www.youtube.com/user/jimmyjohns www.InspireBrands.com This profile is for Jimmy John's Headquarters. Each Jimmy John's is independently owned and operated under a franchise agreement with Jimmy John's Franchise, LLC, franchisor of the JIMMY JOHN'S system. Any questions regarding employment must be directed to the franchise owner/operator. Jimmy John’s Franchise, LLC does not have access to franchisees’ employment records or specific rules for employment as defined by the franchisees.

Loading...
similarCompanies

Jimmy John's Similar Companies

Somos um grande ecossistema de restaurantes que reúne marcas internacionais como Burger King®, Popeyes®, Starbucks® e Subway®. E, por trás de cada receita de sucesso, estão os Zampers: gente que faz acontecer, que joga junto e que deixa sua marca todos os dias. Aqui, a gente acredita que o verdad

Burger King

The year is 1954. Dave and Jim*, two budding entrepreneurs, are on a mission to re-design the perfect broiler, one that will infuse flame-grilled goodness into every burger. And that's how our brand was born. Today the Burger King Corporation, its affiliates and its franchisees collectively operat

We’re KFC. The iconic, brand making world-famous finger lickin’ good fried chicken since 1952. Our unrivaled people and culture are the true heart and soul of our brand. It’s where our people promise comes to life every day. Where our employees can be their best selves, make a difference, and have f

Red Robin

Since opening in 1969 in Seattle, Washington, Red Robin has welcomed Guests to our casual dining restaurants in the U.S. and Canada, connecting people around craveable food and fun in a relaxed, playful atmosphere. Our people are the foundation of our success. We aim to be an inclusive employer of

Chili's opened as a fun Dallas burger joint with a loyalty to happy hour and blue jeans. We prided ourselves on our humble beginnings, following a devotion to great food, warm hospitality and community spirit. Today, with restaurants all over the world, we continue to cook up the best in casual fare

Waffle House, Inc.

Waffle House has been serving Good Food Fast® since 1955. We started in one restaurant serving Avondale Estates, GA, and then grew into a national brand with more than 1,900 restaurants in 25 states providing career paths to 40,000 + employees. The love and devotion of our customer base helped bui

Olive Garden

Founded in 1982, Olive Garden is owned by Darden Restaurants, Inc. (NYSE:DRI), the world's largest company-owned and operated full-service restaurant company. With more than 800 restaurants, more than 92,000 employees and more than $3.5 billion in annual sales, Olive Garden is the leading restaurant

Jersey Mike's Subs

Jersey Mike’s, a fast-casual sub sandwich franchise with more than 3,000 locations open nationwide, believes that making a sub sandwich and making a difference can be one and the same. Jersey Mike’s offers A Sub Above®, serving authentic fresh sliced subs and authentic Philly cheesesteaks grilled t

Culver's Restaurants

With strong, Midwestern family values and genuine hometown hospitality, Culver’s® has proudly served its signature ButterBurgers® and Fresh Frozen Custard since we opened our first restaurant in 1984. There are now over 1,000 Culver’s restaurants in 26 states, with more than 50,000 team members offe

newsone

Jimmy John's CyberSecurity News

December 10, 2025 06:01 PM
Halifax IT system implements many cybersecurity recommendations, but gaps remain: report

Halifax's information technology (IT) system has addressed many of the recommendations in the municipality's auditor general report from...

November 10, 2025 08:00 AM
Rubrik, AWS Deal Aims To Enhance Cybersecurity With AI-Powered Protection

Rubrik's Preemptive Recovery Engine lies at the center of the collaboration. The initiative will deploy AWS's generative AI service,...

September 21, 2025 07:00 AM
Stellantis detects breach at third-party provider for North American customers

Stellantis STLAM.MI detected unauthorized access to a third-party service provider's platform that supports its North American customer...

August 19, 2025 07:00 AM
Nova Scotia Power granted extension to provide information on cybersecurity breach

Nova Scotia Power, which was originally ordered to provide a litany of information on the cybersecurity breach no later than Aug.

July 13, 2025 07:00 AM
With Pennsylvania's 911 working normally, investigation continues into cause of outage

A preliminary investigation found no signs that the outage was cybersecurity-related, said Jeff Robertson, with Comtech Telecommunications,...

July 08, 2025 07:00 AM
Big name data breaches thrust Korea's lax cybersecurity under microscope

A wave of personal data breaches at global luxury brands in Korea, from Louis Vuitton and Dior, and domestic restaurant chains like Subway...

June 11, 2025 07:00 AM
How cybersecurity brands can build trust in the AI era

As AI transforms cybersecurity, brands must prioritize clarity, transparency and human connection over technical specs alone.

June 02, 2025 07:00 AM
This Month's Latest Tech News in Louisville, KY - Saturday May 31st 2025 Edition

Catch up on Louisville's biggest tech and AI breakthroughs, from new partnerships to cybersecurity threats. Stay ahead with this month's top...

May 23, 2025 07:00 AM
Nova Scotia Power says it was victim of ‘sophisticated ransomware attack’

Nova Scotia Power has confirmed it was the “victim of a sophisticated ransomware attack,” and data stolen from its systems has been published.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Jimmy John's CyberSecurity History Information

Official Website of Jimmy John's

The official website of Jimmy John's is http://www.jimmyjohns.com.

Jimmy John's’s AI-Generated Cybersecurity Score

According to Rankiteo, Jimmy John's’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.

How many security badges does Jimmy John's’ have ?

According to Rankiteo, Jimmy John's currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Jimmy John's have SOC 2 Type 1 certification ?

According to Rankiteo, Jimmy John's is not certified under SOC 2 Type 1.

Does Jimmy John's have SOC 2 Type 2 certification ?

According to Rankiteo, Jimmy John's does not hold a SOC 2 Type 2 certification.

Does Jimmy John's comply with GDPR ?

According to Rankiteo, Jimmy John's is not listed as GDPR compliant.

Does Jimmy John's have PCI DSS certification ?

According to Rankiteo, Jimmy John's does not currently maintain PCI DSS compliance.

Does Jimmy John's comply with HIPAA ?

According to Rankiteo, Jimmy John's is not compliant with HIPAA regulations.

Does Jimmy John's have ISO 27001 certification ?

According to Rankiteo,Jimmy John's is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Jimmy John's

Jimmy John's operates primarily in the Restaurants industry.

Number of Employees at Jimmy John's

Jimmy John's employs approximately 18,724 people worldwide.

Subsidiaries Owned by Jimmy John's

Jimmy John's presently has no subsidiaries across any sectors.

Jimmy John's’s LinkedIn Followers

Jimmy John's’s official LinkedIn profile has approximately 47,470 followers.

NAICS Classification of Jimmy John's

Jimmy John's is classified under the NAICS code 7225, which corresponds to Restaurants and Other Eating Places.

Jimmy John's’s Presence on Crunchbase

Yes, Jimmy John's has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/jimmy-johns-gourmet-sandwiches.

Jimmy John's’s Presence on LinkedIn

Yes, Jimmy John's maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jimmy-john's.

Cybersecurity Incidents Involving Jimmy John's

As of December 23, 2025, Rankiteo reports that Jimmy John's has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Jimmy John's has an estimated 4,864 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Jimmy John's ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Jimmy John's Payment Card Security Incident

Description: Unauthorized access to payment card data affecting approximately 216 stores.

Date Detected: 2014-09-24

Date Publicly Disclosed: 2014-09-24

Type: Data Breach

Attack Vector: Unauthorized Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach JIM204072525

Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credit And Debit Card Data, Card Numbers, Cardholder Names, Verification Codes, Expiration Dates and .

Which entities were affected by each incident ?

Incident : Data Breach JIM204072525

Entity Name: Jimmy John's

Entity Type: Restaurant Chain

Industry: Food and Beverage

Location: Multiple

Size: Approximately 216 stores

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach JIM204072525

Type of Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates

Sensitivity of Data: High

Personally Identifiable Information: Cardholder names

References

Where can I find more information about each incident ?

Incident : Data Breach JIM204072525

Source: California Office of the Attorney General

Date Accessed: 2014-09-24

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-09-24.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2014-09-24.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-09-24.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Verification codes, Credit and debit card data, Expiration dates, Cardholder names and Card numbers.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Description

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=jimmy-john's' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge