Company Details
kenneth-young-center
264
3,623
62133
kennethyoung.org
2
KEN_1643628
Completed


Kenneth Young Center Company CyberSecurity Posture
kennethyoung.orgAt Kenneth Young Center, we believe that "Together We Thrive." Through our comprehensive and compassionate approach, we safeguard our communities' health through: - counseling for adults, children, and families - assessment, stabilization, and linkage for adults/children in psychiatric crisis - treatment, support, and recovery services for those with serious mental illness - service coordination and in-home services for frail elderly persons - youth empowerment programs - addiction and recovery support - LGBTQ+ youth and young adult services - volunteer opportunities ...and so much more. Join us as we serve our community through more than 35 programs and services. Please support our programs by shopping our Amazon Wish List: https://a.co/8cmOttz
Company Details
kenneth-young-center
264
3,623
62133
kennethyoung.org
2
KEN_1643628
Completed
Between 700 and 749

KYC Global Score (TPRM)XXXX

Description: The Vermont Office of the Attorney General reported on April 8, 2024, that Kenneth Young Center experienced a data breach on March 6, 2024, potentially exposing employee information including names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, and dates of birth. The number of individuals affected is currently unknown.


No incidents recorded for Kenneth Young Center in 2026.
No incidents recorded for Kenneth Young Center in 2026.
No incidents recorded for Kenneth Young Center in 2026.
KYC cyber incidents detection timeline including parent company and subsidiaries

At Kenneth Young Center, we believe that "Together We Thrive." Through our comprehensive and compassionate approach, we safeguard our communities' health through: - counseling for adults, children, and families - assessment, stabilization, and linkage for adults/children in psychiatric crisis - treatment, support, and recovery services for those with serious mental illness - service coordination and in-home services for frail elderly persons - youth empowerment programs - addiction and recovery support - LGBTQ+ youth and young adult services - volunteer opportunities ...and so much more. Join us as we serve our community through more than 35 programs and services. Please support our programs by shopping our Amazon Wish List: https://a.co/8cmOttz


Biomedical Data Matters Our CorePsych team specializes in the most advanced brain and biomedical assessments with highly specific treatment recommendations for those who suffer with refractory, inadequate responses to conventional psychiatric/brain treatments at any level. The compelling imperati

We are a behavioral healthcare agency offering services for adults, youth, and families with mental health and addictive disease challenges as well as adults with intellectual and developmental disabilities. As a public safety net provider, we serve individuals who have little to no financial reso

Family Enhancement LLC was established in December 2008 to promote mental health among children and families in New Jersey and provide them with mental health support and resources. Agency services includes intensive in-community (IIC) counseling in which licensed clinicians provide short-term

New Mexico Solutions is a nonprofit organization offering comprehensive community-based services in the Albuquerque area. Since 1999, New Mexico Solutions has provided effective, ethical and responsive services to the community. New Mexico Solutions provides services under the philosophy that client

At Northwest Counsel we truly do believe that "Change comes through relationship". This means building authentic relationships with our clients and establishing positive rapport and trust to help usher in real, long-lasting change in peoples' lives - not just band-aid solutions. As therapists we

Sound Community Services, Inc. (SCSI) is a private, not-for-profit organization dedicated to educating and assisting individuals with behavioral health needs to achieve independence and integrate into the larger community. Its current multi-program approach offers employment, social rehabilitation,

June 28, 2024: We are excited to announce a significant partnership between the Community Health Awareness Council (CHAC) and Pacific Clinics. This collaboration aims to expand and enhance high-quality mental health support for children, youth, families, and adults in northern Santa Clara County. U

You can find joy, excitement and even a sense of calmness in life, EVEN during these stressful times. The key is learning how to take a step back and take care of yourself along the way. This world and the society we live in can be hard, stressful and overwhelming these days. It can be even harde

SohoMD is a telepsychiatry and teletherapy organization, using technology to efficiently deliver high-quality psychiatric care to patients. The organization focuses on patients living with depression, anxiety, and attention deficit disorder. Patients can immediately access care from their mobile dev
.png)
A Pew Research Center survey finds that many Americans are unclear about some key cybersecurity topics, terms and concepts.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Kenneth Young Center is http://www.kennethyoung.org.
According to Rankiteo, Kenneth Young Center’s AI-generated cybersecurity score is 712, reflecting their Moderate security posture.
According to Rankiteo, Kenneth Young Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Kenneth Young Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Kenneth Young Center is not certified under SOC 2 Type 1.
According to Rankiteo, Kenneth Young Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Kenneth Young Center is not listed as GDPR compliant.
According to Rankiteo, Kenneth Young Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Kenneth Young Center is not compliant with HIPAA regulations.
According to Rankiteo,Kenneth Young Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Kenneth Young Center operates primarily in the Mental Health Care industry.
Kenneth Young Center employs approximately 264 people worldwide.
Kenneth Young Center presently has no subsidiaries across any sectors.
Kenneth Young Center’s official LinkedIn profile has approximately 3,623 followers.
Kenneth Young Center is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Kenneth Young Center does not have a profile on Crunchbase.
Yes, Kenneth Young Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/kenneth-young-center.
As of January 24, 2026, Rankiteo reports that Kenneth Young Center has experienced 1 cybersecurity incidents.
Kenneth Young Center has an estimated 5,279 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Kenneth Young Center Data Breach
Description: The Vermont Office of the Attorney General reported on April 8, 2024, that Kenneth Young Center experienced a data breach on March 6, 2024, potentially exposing employee information including names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, and dates of birth. The number of individuals affected is currently unknown.
Date Detected: 2024-03-06
Date Publicly Disclosed: 2024-04-08
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Driver’s license information, Financial account information, Passport numbers, Medical information, Health insurance information, Dates of birth
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Driver’S License Information, Financial Account Information, Passport Numbers, Medical Information, Health Insurance Information, Dates Of Birth and .

Type of Data Compromised: Names, Social security numbers, Driver’s license information, Financial account information, Passport numbers, Medical information, Health insurance information, Dates of birth
Sensitivity of Data: High

Source: Vermont Office of the Attorney General
Date Accessed: 2024-04-08
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-04-08.
Most Recent Incident Detected: The most recent incident detected was on 2024-03-06.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-08.
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, driver’s license information, financial account information, passport numbers, medical information, health insurance information, dates of birth and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical information, Social Security numbers, passport numbers, driver’s license information, dates of birth, names, health insurance information and financial account information.
Most Recent Source: The most recent source of information about an incident is Vermont Office of the Attorney General.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.