Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At Kenneth Young Center, we believe that "Together We Thrive." Through our comprehensive and compassionate approach, we safeguard our communities' health through: - counseling for adults, children, and families - assessment, stabilization, and linkage for adults/children in psychiatric crisis - treatment, support, and recovery services for those with serious mental illness - service coordination and in-home services for frail elderly persons - youth empowerment programs - addiction and recovery support - LGBTQ+ youth and young adult services - volunteer opportunities ...and so much more. Join us as we serve our community through more than 35 programs and services. Please support our programs by shopping our Amazon Wish List: https://a.co/8cmOttz

Kenneth Young Center A.I CyberSecurity Scoring

KYC

Company Details

Linkedin ID:

kenneth-young-center

Employees number:

264

Number of followers:

3,623

NAICS:

62133

Industry Type:

Mental Health Care

Homepage:

kennethyoung.org

IP Addresses:

2

Company ID:

KEN_1643628

Scan Status:

Completed

AI scoreKYC Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/kenneth-young-center.jpeg
KYC Mental Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreKYC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/kenneth-young-center.jpeg
KYC Mental Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

KYC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Kenneth Young CenterBreach6033/2024NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The Vermont Office of the Attorney General reported on April 8, 2024, that Kenneth Young Center experienced a data breach on March 6, 2024, potentially exposing employee information including names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, and dates of birth. The number of individuals affected is currently unknown.

Kenneth Young Center
Breach
Severity: 60
Impact: 3
Seen: 3/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The Vermont Office of the Attorney General reported on April 8, 2024, that Kenneth Young Center experienced a data breach on March 6, 2024, potentially exposing employee information including names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, and dates of birth. The number of individuals affected is currently unknown.

Ailogo

KYC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for KYC

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Kenneth Young Center in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Kenneth Young Center in 2026.

Incident Types KYC vs Mental Health Care Industry Avg (This Year)

No incidents recorded for Kenneth Young Center in 2026.

Incident History — KYC (X = Date, Y = Severity)

KYC cyber incidents detection timeline including parent company and subsidiaries

KYC Company Subsidiaries

SubsidiaryImage

At Kenneth Young Center, we believe that "Together We Thrive." Through our comprehensive and compassionate approach, we safeguard our communities' health through: - counseling for adults, children, and families - assessment, stabilization, and linkage for adults/children in psychiatric crisis - treatment, support, and recovery services for those with serious mental illness - service coordination and in-home services for frail elderly persons - youth empowerment programs - addiction and recovery support - LGBTQ+ youth and young adult services - volunteer opportunities ...and so much more. Join us as we serve our community through more than 35 programs and services. Please support our programs by shopping our Amazon Wish List: https://a.co/8cmOttz

Loading...
similarCompanies

KYC Similar Companies

CorePsych Is Closed

Biomedical Data Matters Our CorePsych team specializes in the most advanced brain and biomedical assessments with highly specific treatment recommendations for those who suffer with refractory, inadequate responses to conventional psychiatric/brain treatments at any level. The compelling imperati

Highland Rivers Behavioral Health

We are a behavioral healthcare agency offering services for adults, youth, and families with mental health and addictive disease challenges as well as adults with intellectual and developmental disabilities. As a public safety net provider, we serve individuals who have little to no financial reso

Family Enhancement LLC

Family Enhancement LLC was established in December 2008 to promote mental health among children and families in New Jersey and provide them with mental health support and resources. Agency services includes intensive in-community (IIC) counseling in which licensed clinicians provide short-term

New Mexico Solutions (NMS)

New Mexico Solutions is a nonprofit organization offering comprehensive community-based services in the Albuquerque area. Since 1999, New Mexico Solutions has provided effective, ethical and responsive services to the community. New Mexico Solutions provides services under the philosophy that client

Northwest Counsel

At Northwest Counsel we truly do believe that "Change comes through relationship"​. This means building authentic relationships with our clients and establishing positive rapport and trust to help usher in real, long-lasting change in peoples'​ lives - not just band-aid solutions. As therapists we

Sound Community Services, Inc.

Sound Community Services, Inc. (SCSI) is a private, not-for-profit organization dedicated to educating and assisting individuals with behavioral health needs to achieve independence and integrate into the larger community. Its current multi-program approach offers employment, social rehabilitation,

June 28, 2024: We are excited to announce a significant partnership between the Community Health Awareness Council (CHAC) and Pacific Clinics. This collaboration aims to expand and enhance high-quality mental health support for children, youth, families, and adults in northern Santa Clara County. U

Healing Roots Wellness Center

You can find joy, excitement and even a sense of calmness in life, EVEN during these stressful times. The key is learning how to take a step back and take care of yourself along the way. This world and the society we live in can be hard, stressful and overwhelming these days. It can be even harde

SohoMD, PLLC

SohoMD is a telepsychiatry and teletherapy organization, using technology to efficiently deliver high-quality psychiatric care to patients. The organization focuses on patients living with depression, anxiety, and attention deficit disorder. Patients can immediately access care from their mobile dev

newsone

KYC CyberSecurity News

March 22, 2017 07:00 AM
What the Public Knows About Cybersecurity

A Pew Research Center survey finds that many Americans are unclear about some key cybersecurity topics, terms and concepts.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

KYC CyberSecurity History Information

Official Website of Kenneth Young Center

The official website of Kenneth Young Center is http://www.kennethyoung.org.

Kenneth Young Center’s AI-Generated Cybersecurity Score

According to Rankiteo, Kenneth Young Center’s AI-generated cybersecurity score is 712, reflecting their Moderate security posture.

How many security badges does Kenneth Young Center’ have ?

According to Rankiteo, Kenneth Young Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Kenneth Young Center been affected by any supply chain cyber incidents ?

According to Rankiteo, Kenneth Young Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Kenneth Young Center have SOC 2 Type 1 certification ?

According to Rankiteo, Kenneth Young Center is not certified under SOC 2 Type 1.

Does Kenneth Young Center have SOC 2 Type 2 certification ?

According to Rankiteo, Kenneth Young Center does not hold a SOC 2 Type 2 certification.

Does Kenneth Young Center comply with GDPR ?

According to Rankiteo, Kenneth Young Center is not listed as GDPR compliant.

Does Kenneth Young Center have PCI DSS certification ?

According to Rankiteo, Kenneth Young Center does not currently maintain PCI DSS compliance.

Does Kenneth Young Center comply with HIPAA ?

According to Rankiteo, Kenneth Young Center is not compliant with HIPAA regulations.

Does Kenneth Young Center have ISO 27001 certification ?

According to Rankiteo,Kenneth Young Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Kenneth Young Center

Kenneth Young Center operates primarily in the Mental Health Care industry.

Number of Employees at Kenneth Young Center

Kenneth Young Center employs approximately 264 people worldwide.

Subsidiaries Owned by Kenneth Young Center

Kenneth Young Center presently has no subsidiaries across any sectors.

Kenneth Young Center’s LinkedIn Followers

Kenneth Young Center’s official LinkedIn profile has approximately 3,623 followers.

NAICS Classification of Kenneth Young Center

Kenneth Young Center is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).

Kenneth Young Center’s Presence on Crunchbase

No, Kenneth Young Center does not have a profile on Crunchbase.

Kenneth Young Center’s Presence on LinkedIn

Yes, Kenneth Young Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/kenneth-young-center.

Cybersecurity Incidents Involving Kenneth Young Center

As of January 24, 2026, Rankiteo reports that Kenneth Young Center has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Kenneth Young Center has an estimated 5,279 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Kenneth Young Center ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Kenneth Young Center Data Breach

Description: The Vermont Office of the Attorney General reported on April 8, 2024, that Kenneth Young Center experienced a data breach on March 6, 2024, potentially exposing employee information including names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, and dates of birth. The number of individuals affected is currently unknown.

Date Detected: 2024-03-06

Date Publicly Disclosed: 2024-04-08

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach KEN235072625

Data Compromised: Names, Social security numbers, Driver’s license information, Financial account information, Passport numbers, Medical information, Health insurance information, Dates of birth

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Driver’S License Information, Financial Account Information, Passport Numbers, Medical Information, Health Insurance Information, Dates Of Birth and .

Which entities were affected by each incident ?

Incident : Data Breach KEN235072625

Entity Name: Kenneth Young Center

Entity Type: Organization

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach KEN235072625

Type of Data Compromised: Names, Social security numbers, Driver’s license information, Financial account information, Passport numbers, Medical information, Health insurance information, Dates of birth

Sensitivity of Data: High

References

Where can I find more information about each incident ?

Incident : Data Breach KEN235072625

Source: Vermont Office of the Attorney General

Date Accessed: 2024-04-08

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-04-08.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-03-06.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-08.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, dates of birth and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical information, Social Security numbers, passport numbers, driver’s license information, dates of birth, names, health insurance information and financial account information.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Vermont Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=kenneth-young-center' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge