Company Details
mcelroy-associates
53
1,258
23
mea.ie
0
MCE_9218352
In-progress


McElroy Associates Company CyberSecurity Posture
mea.ieMcElroy Associates carry out work in the Design, Project Management and Construction Supervision of building projects for international and Irish clients, primarily in the industrial sector across a range of pharmaceutical, healthcare, process and food industry companies. McElroy Associates was founded in 1991 and since then we have focused on developing strong working relationships with our clients which we believe forms our core ability to successfully deliver projects. Our experience covers a wide range of projects in new and existing facilities and we offer a comprehensive range of services in Civil, Structural, Architectural, Mechanical and Electrical Engineering and Project Management
Company Details
mcelroy-associates
53
1,258
23
mea.ie
0
MCE_9218352
In-progress
Between 650 and 699

McElroy Associates Global Score (TPRM)XXXX

Description: McElroy & Associates Suffers Data Breach Exposing PII and PHI of 6,633 Individuals McElroy & Associates, Inc. disclosed a data breach affecting 6,633 individuals in the U.S., exposing personally identifiable information (PII) and protected health information (PHI). The breach was reported to the U.S. Department of Health and Human Services on October 17, 2025, after suspicious activity was detected in an employee’s email account on May 30, 2025. An investigation revealed that an unauthorized actor accessed emails between May 28 and May 30, 2025, compromising sensitive data, including names, Social Security numbers, dates of birth, driver’s license numbers, financial account details, medical records, health insurance information, and login credentials. By September 3, 2025, the company completed its assessment and began mailing notifications to affected individuals, while also publishing a Notice of Data Security Event on its website. In response, McElroy & Associates secured its email systems, conducted a full review of impacted data, and established a dedicated helpline (833-866-9545) for affected individuals. The breach underscores the ongoing risks to sensitive healthcare and financial data in cyber incidents.


No incidents recorded for McElroy Associates in 2026.
No incidents recorded for McElroy Associates in 2026.
No incidents recorded for McElroy Associates in 2026.
McElroy Associates cyber incidents detection timeline including parent company and subsidiaries

McElroy Associates carry out work in the Design, Project Management and Construction Supervision of building projects for international and Irish clients, primarily in the industrial sector across a range of pharmaceutical, healthcare, process and food industry companies. McElroy Associates was founded in 1991 and since then we have focused on developing strong working relationships with our clients which we believe forms our core ability to successfully deliver projects. Our experience covers a wide range of projects in new and existing facilities and we offer a comprehensive range of services in Civil, Structural, Architectural, Mechanical and Electrical Engineering and Project Management

Our purpose is to sustainably deliver infrastructure which is vital to the UK. As a leading provider of infrastructure services, construction and property developments, we are committed to delivering for communities and leaving lasting legacies through our work. We are committed to attracting, reta

Hilti stands for innovation and direct customer relationships. About 34,000 employees around the world, in more than 120 countries, contribute to making our customers’ work more productive, safer and more sustainable. We do this with our hardware, software and service offering. With roughly 280,000

Bouygues Construction employs 35,600 people around the world, all driven by the greatest and most exciting responsibility of all – building for life. For our customers in more than 50 countries, we deliver much more than projects. We build to create spaces, connections and opportunities. We impro

ALEC Holdings, part of the Investment Corporate of Dubai (ICD), is a leading construction and related businesses group operating in the UAE and KSA. The company builds and provides construction solutions that set industry benchmarks for quality, safety, functionality, and aesthetics. ALEC Holdings

Premier groupe français et acteur mondial de premier plan de la construction, VINCI Construction réunit plus de 830 entreprises et près de 69000 collaborateurs dans une centaine de pays. Ses expertises s’étendent à l’ensemble des métiers du bâtiment, du génie civil, et des activités spécialisées ass

NCC is one of the leading construction companies in the Nordics. Based on its expertise in managing complex construction processes, NCC contributes to a positive impact of construction for its customers and society. NCC is one of the largest players in the Nordic construction market, and operates
GMR Group is a leading Indian infrastructure conglomerate with a diversified presence across Airports, Energy, Transportation, Urban Infrastructure, and Sports. With over two decades of experience, the Group has built world-class assets and pioneered innovations in sustainable infrastructure develop

Hassan Allam Holding is a leading group with a focus on engineering and construction, and investment and development. The Group operates in diverse sectors including infrastructure, energy, water, industrial, logistics, petrochemical, and complex large-scale projects in Egypt and the MENA region. Th

Colas, a subsidiary of the Bouygues Group, is a major player in the construction and maintenance of transportation infrastructure and urban development. Colas covers the entire value chain: from industrial production to service offerings, including construction work. Thanks to its local presence
.png)
Data breaches have recently been announced by the California radiology specialists, Expert MRI, and the small business technology...
Rick McElroy, Principal Cybersecurity Strategist at VMware, discusses what chief information security officers (CISOs) should keep in mind as we get closer to...
Lewis and Clark Community College transfer student Abby McElroy is pursuing a degree in criminology and criminal justice with the help of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of McElroy Associates is http://www.mea.ie.
According to Rankiteo, McElroy Associates’s AI-generated cybersecurity score is 683, reflecting their Weak security posture.
According to Rankiteo, McElroy Associates currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, McElroy Associates has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, McElroy Associates is not certified under SOC 2 Type 1.
According to Rankiteo, McElroy Associates does not hold a SOC 2 Type 2 certification.
According to Rankiteo, McElroy Associates is not listed as GDPR compliant.
According to Rankiteo, McElroy Associates does not currently maintain PCI DSS compliance.
According to Rankiteo, McElroy Associates is not compliant with HIPAA regulations.
According to Rankiteo,McElroy Associates is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
McElroy Associates operates primarily in the Construction industry.
McElroy Associates employs approximately 53 people worldwide.
McElroy Associates presently has no subsidiaries across any sectors.
McElroy Associates’s official LinkedIn profile has approximately 1,258 followers.
McElroy Associates is classified under the NAICS code 23, which corresponds to Construction.
No, McElroy Associates does not have a profile on Crunchbase.
Yes, McElroy Associates maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mcelroy-associates.
As of January 25, 2026, Rankiteo reports that McElroy Associates has experienced 1 cybersecurity incidents.
McElroy Associates has an estimated 39,315 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with secured email environment, and remediation measures with comprehensive investigation, review of impacted information, and communication strategy with notified affected individuals by mail, posted notice of data security event on website, dedicated helpline..
Title: McElroy & Associates Data Breach
Description: McElroy & Associates, Inc. experienced a significant data breach that exposed the personally identifiable information (PII) and protected health information (PHI) of 6,633 individuals in the U.S. The breach was detected when suspicious activity was discovered in an employee’s email account, allowing an unauthorized actor to access sensitive information.
Date Detected: 2025-05-30
Date Publicly Disclosed: 2025-10-17
Type: Data Breach
Attack Vector: Compromised Email Account
Threat Actor: Unauthorized Actor
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Employee email account.

Data Compromised: PII and PHI of 6,633 individuals
Systems Affected: Employee email account
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Entity Name: McElroy & Associates, Inc.
Entity Type: Company
Location: U.S.
Customers Affected: 6,633 individuals

Containment Measures: Secured email environment
Remediation Measures: Comprehensive investigation, review of impacted information
Communication Strategy: Notified affected individuals by mail, posted Notice of Data Security Event on website, dedicated helpline

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 6,633
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesSocial Security numbersDates of birthDriver’s license numbersFinancial account detailsMedical informationHealth insurance informationUsernames with passwords
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Comprehensive investigation, review of impacted information.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured email environment.

Regulatory Notifications: U.S. Department of Health and Human Services

Recommendations: Carefully review any notice or communication from McElroy & Associates or your provider., Monitor financial accounts and credit reports for signs of identity theft., Consider placing fraud alerts or credit freezes with the major credit bureaus., Be cautious of unsolicited emails or phone calls requesting personal information.Carefully review any notice or communication from McElroy & Associates or your provider., Monitor financial accounts and credit reports for signs of identity theft., Consider placing fraud alerts or credit freezes with the major credit bureaus., Be cautious of unsolicited emails or phone calls requesting personal information.Carefully review any notice or communication from McElroy & Associates or your provider., Monitor financial accounts and credit reports for signs of identity theft., Consider placing fraud alerts or credit freezes with the major credit bureaus., Be cautious of unsolicited emails or phone calls requesting personal information.Carefully review any notice or communication from McElroy & Associates or your provider., Monitor financial accounts and credit reports for signs of identity theft., Consider placing fraud alerts or credit freezes with the major credit bureaus., Be cautious of unsolicited emails or phone calls requesting personal information.

Source: McElroy & Associates Notice of Data Security Event
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: McElroy & Associates Notice of Data Security Event.

Investigation Status: Completed analysis of impacted data (as of 2025-09-03)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified affected individuals by mail, posted Notice of Data Security Event on website and dedicated helpline.

Customer Advisories: Dedicated helpline at 833-866-9545 (8 a.m. to 8 p.m. ET)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Dedicated helpline at 833-866-9545 (8 a.m. to 8 p.m. ET).

Entry Point: Employee email account
Last Attacking Group: The attacking group in the last incident was an Unauthorized Actor.
Most Recent Incident Detected: The most recent incident detected was on 2025-05-30.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-17.
Most Significant Data Compromised: The most significant data compromised in an incident were PII and PHI of 6 and633 individuals.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured email environment.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were PII and PHI of 6 and633 individuals.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 6.6K.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Be cautious of unsolicited emails or phone calls requesting personal information., Carefully review any notice or communication from McElroy & Associates or your provider., Consider placing fraud alerts or credit freezes with the major credit bureaus. and Monitor financial accounts and credit reports for signs of identity theft..
Most Recent Source: The most recent source of information about an incident is McElroy & Associates Notice of Data Security Event.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed analysis of impacted data (as of 2025-09-03).
Most Recent Customer Advisory: The most recent customer advisory issued was an Dedicated helpline at 833-866-9545 (8 a.m. to 8 p.m. ET).
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Employee email account.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.