Comparison Overview

Logansport Community School Corporation

VS

XTIUM

Logansport Community School Corporation

None, None, Logansport, None, US, None
Last Update: 2025-08-05 (UTC)
Between 650 and 699

None

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 379
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
2

XTIUM

None, None, New York, NY, US, 10119
Last Update: 2025-08-05 (UTC)
Between 700 and 749

XTIUM, created through the business combination of ATSG and Evolve IP, delivers a modern security-first approach to the managed IT services experience. Leveraging AI innovations, enterprise-grade cybersecurity, virtual desktops, unified communications, and more, XTIUM acts as a trusted partner to help businesses reduce risk, boost operational efficiency, and scale with confidence.

NAICS: 5415
NAICS Definition: Computer Systems Design and Related Services
Employees: 489
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Logansport Community School Corporation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/xtium.jpeg
XTIUM
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Logansport Community School Corporation
100%
Compliance Rate
0/4 Standards Verified
XTIUM
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Logansport Community School Corporation in 2025.

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for XTIUM in 2025.

Incident History — Logansport Community School Corporation (X = Date, Y = Severity)

Logansport Community School Corporation cyber incidents detection timeline including parent company and subsidiaries

Incident History — XTIUM (X = Date, Y = Severity)

XTIUM cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Logansport Community School Corporation
Incidents

Date Detected: 4/2021
Type:Ransomware
Attack Vector: Ransomware
Blog: Blog

Date Detected: 04/2021
Type:Data Leak
Blog: Blog
https://images.rankiteo.com/companyimages/xtium.jpeg
XTIUM
Incidents

Date Detected: 9/2024
Type:Breach
Attack Vector: Hacking
Blog: Blog

FAQ

XTIUM company demonstrates a stronger AI Cybersecurity Score compared to Logansport Community School Corporation company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Logansport Community School Corporation company has faced a higher number of disclosed cyber incidents historically compared to XTIUM company.

In the current year, XTIUM company and Logansport Community School Corporation company have not reported any cyber incidents.

Logansport Community School Corporation company has confirmed experiencing a ransomware attack, while XTIUM company has not reported such incidents publicly.

XTIUM company has disclosed at least one data breach, while Logansport Community School Corporation company has not reported such incidents publicly.

Neither XTIUM company nor Logansport Community School Corporation company has reported experiencing targeted cyberattacks publicly.

Neither Logansport Community School Corporation company nor XTIUM company has reported experiencing or disclosing vulnerabilities publicly.

Neither Logansport Community School Corporation nor XTIUM holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Logansport Community School Corporation company nor XTIUM company has publicly disclosed detailed information about the number of their subsidiaries.

XTIUM company employs more people globally than Logansport Community School Corporation company, reflecting its scale as a IT Services and IT Consulting.

Neither Logansport Community School Corporation nor XTIUM holds SOC 2 Type 1 certification.

Neither Logansport Community School Corporation nor XTIUM holds SOC 2 Type 2 certification.

Neither Logansport Community School Corporation nor XTIUM holds ISO 27001 certification.

Neither Logansport Community School Corporation nor XTIUM holds PCI DSS certification.

Neither Logansport Community School Corporation nor XTIUM holds HIPAA certification.

Neither Logansport Community School Corporation nor XTIUM holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios Log Server versions prior to 2024R1.3.2 contain a privilege escalation vulnerability in the account email-change workflow. A user could set their own email to an invalid value and, due to insufficient validation and authorization checks tied to email identity state, trigger inconsistent account state that granted elevated privileges or bypassed intended access controls.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.

Risk Information
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2026R1 contain a remote code execution vulnerability in the Core Config Manager (CCM) Run Check command. Insufficient validation/escaping of parameters used to build backend command lines allows an authenticated administrator to inject shell metacharacters that are executed on the server. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain control of the underlying host operating system.

Risk Information
cvss4
Base: 9.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2024R2 contain a command injection vulnerability in the WinRM plugin. Insufficient validation of user-supplied parameters allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to modify configuration, exfiltrate data, disrupt monitoring operations, or execute commands on the underlying host operating system.

Risk Information
cvss4
Base: 9.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2024R1.4.2 revealed API keys to users who were not authorized for API access when using Neptune themes. An authenticated user without API privileges could view another user's or their own API key value.

Risk Information
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X