Comparison Overview

Lancashire Mind

VS

Clarvida Access Family Services

Lancashire Mind

80-82 Devonshire Road, Chorley, PR7 2DR, GB
Last Update: 2026-01-22

Lancashire Mind was officially formed in 2010 after the joining of three local Minds: Chorley and South Ribble, Blackburn with Darwen, and Blackpool, Fylde and North Lancashire. Since then, we haven’t stopped progressing. In 2014 we launched the Blueprint for Lancashire, marking the start of the wellbeing revolution. Two years later we’re making good progress. We’ve successfully put the prevention of mental health conditions on the agenda, with local Councils and Clinical Commissioning Groups. In addition to our support services, we’ve rolled out a range of wellbeing and prevention initiatives, working across schools, workplaces and communities in Lancashire. We are more than a mental health charity. We’re a passionate movement leading the mental wellbeing revolution in Lancashire. We campaign to make mental wellbeing a local priority. We help you find the tools you need to stay on track, and when needed, get back on track. We work in schools and businesses across Lancashire to shape a generation that won’t treat people differently based on their mental health. And we don’t stop there. It’s big, bold and ambitious. A whole population approach that works for people at every level of mental health. Together, we can achieve it. Let’s make Lancashire the beacon county for mental wellbeing.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 69
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Clarvida Access Family Services

77 Center Drive , Charlotte, 28217, US
Last Update: 2026-01-13

Access Family Services, Inc. (AFS) is a behavioral health agency that has been serving children and families throughout North Carolina since 1999. Offices are located throughout North Carolina and South Carolina. AFS is a proud subsidiary of Pathways Health and Community Support. Pathways allows for additional clinical expertise and financial resources to strengthen our overall quality and sustainability. We believe that everyone has the ability to change, maximize his or her potential and strengthen the family/ support system. Our highly trained clinical staff partner with individuals to reach agreed upon goals by practicing new skills to improve overall functioning. By employing a strength-based, individualized approach, evidence-based clinical interventions are used to improve emotional and behavioral needs. AFS offers a comprehensive array of intensive family and individual services to stabilize the living environment reduce out-of-home placement and unify the family. Comprehensive services are delivered to children, adults and families with serious behavioral and emotional needs based on a mental health or autism diagnosis. Most of are services are delivered in the home. Additional school-based and office-based services are offered in several clinical programs. Access Family Services, Inc., is accredited by the Commission on Accreditation of Rehabilitative Facilities (CARF), certified as a critical access behavioral health agency and licensed by the North Carolina Department of Health and Human Services. Access Family Services accepts Medicaid and most other insurances in North and South Carolina.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 148
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/lancashire-mind.jpeg
Lancashire Mind
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/access-family-services.jpeg
Clarvida Access Family Services
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Lancashire Mind
100%
Compliance Rate
0/4 Standards Verified
Clarvida Access Family Services
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Lancashire Mind in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Clarvida Access Family Services in 2026.

Incident History — Lancashire Mind (X = Date, Y = Severity)

Lancashire Mind cyber incidents detection timeline including parent company and subsidiaries

Incident History — Clarvida Access Family Services (X = Date, Y = Severity)

Clarvida Access Family Services cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/lancashire-mind.jpeg
Lancashire Mind
Incidents

No Incident

https://images.rankiteo.com/companyimages/access-family-services.jpeg
Clarvida Access Family Services
Incidents

No Incident

FAQ

Clarvida Access Family Services company demonstrates a stronger AI Cybersecurity Score compared to Lancashire Mind company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Clarvida Access Family Services company has disclosed a higher number of cyber incidents compared to Lancashire Mind company.

In the current year, Clarvida Access Family Services company and Lancashire Mind company have not reported any cyber incidents.

Neither Clarvida Access Family Services company nor Lancashire Mind company has reported experiencing a ransomware attack publicly.

Neither Clarvida Access Family Services company nor Lancashire Mind company has reported experiencing a data breach publicly.

Neither Clarvida Access Family Services company nor Lancashire Mind company has reported experiencing targeted cyberattacks publicly.

Neither Lancashire Mind company nor Clarvida Access Family Services company has reported experiencing or disclosing vulnerabilities publicly.

Neither Lancashire Mind nor Clarvida Access Family Services holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Lancashire Mind company nor Clarvida Access Family Services company has publicly disclosed detailed information about the number of their subsidiaries.

Clarvida Access Family Services company employs more people globally than Lancashire Mind company, reflecting its scale as a Mental Health Care.

Neither Lancashire Mind nor Clarvida Access Family Services holds SOC 2 Type 1 certification.

Neither Lancashire Mind nor Clarvida Access Family Services holds SOC 2 Type 2 certification.

Neither Lancashire Mind nor Clarvida Access Family Services holds ISO 27001 certification.

Neither Lancashire Mind nor Clarvida Access Family Services holds PCI DSS certification.

Neither Lancashire Mind nor Clarvida Access Family Services holds HIPAA certification.

Neither Lancashire Mind nor Clarvida Access Family Services holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H