Company Details
multicare-health-system
11,958
62,390
62
multicare.org
0
MUL_1272346
In-progress

MultiCare Health System Company CyberSecurity Posture
multicare.orgMultiCare’s roots in the Pacific Northwest go back to 1882, with the founding of Tacoma’s first hospital. Over the years, we’ve grown from a Tacoma-centric, hospital-based organization into the largest, community-based, locally governed health system in the state of Washington. Today, our comprehensive system of health includes more than 300 primary, urgent, pediatric and specialty care locations across Washington, Idaho and Oregon, as well as 13 hospitals. We welcome patients from the entire Pacific Northwest region and our 20,000-plus team members — including employees, providers and volunteers — proudly care for the communities we serve. Without a doubt, our organization has changed over the years. But what has never changed, throughout our long history, has been our dedication to health and wellness of the people of the Pacific Northwest. Guided by our mission, vision and values, we are on continuous journey to deliver the services that our communities need, and to ensure access to those services, now and in the future.
Company Details
multicare-health-system
11,958
62,390
62
multicare.org
0
MUL_1272346
In-progress
Between 650 and 699

MHS Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported that MultiCare Health System, Inc. experienced an external system breach on May 18, 2022, due to hacking, affecting a total of 23,712 individuals, including 3 residents of Maine. The breach involved potential compromise of Social Security Numbers and identity theft protection services were offered for two years through Equifax credit monitoring.
Description: MultiCare Health System in Washington suffered a third-party data breach that originated at its mailing service provider, Kaye-Smith. The breach impacted more than 23,000 individuals at MultiCare. The breached information included Names, addresses, and Social Security numbers.
Description: On August 21, 2020, the Washington State Office of the Attorney General reported a ransomware attack affecting MultiCare Health System, which took place from February 7, 2020, to May 20, 2020. The incident impacted 302,769 Washington residents, with the compromised information including names, addresses, telephone numbers, and medical information.


No incidents recorded for MultiCare Health System in 2025.
No incidents recorded for MultiCare Health System in 2025.
No incidents recorded for MultiCare Health System in 2025.
MHS cyber incidents detection timeline including parent company and subsidiaries

MultiCare’s roots in the Pacific Northwest go back to 1882, with the founding of Tacoma’s first hospital. Over the years, we’ve grown from a Tacoma-centric, hospital-based organization into the largest, community-based, locally governed health system in the state of Washington. Today, our comprehensive system of health includes more than 300 primary, urgent, pediatric and specialty care locations across Washington, Idaho and Oregon, as well as 13 hospitals. We welcome patients from the entire Pacific Northwest region and our 20,000-plus team members — including employees, providers and volunteers — proudly care for the communities we serve. Without a doubt, our organization has changed over the years. But what has never changed, throughout our long history, has been our dedication to health and wellness of the people of the Pacific Northwest. Guided by our mission, vision and values, we are on continuous journey to deliver the services that our communities need, and to ensure access to those services, now and in the future.


At Piedmont, we deliver healthcare marked by compassion and sustainable excellence in a progressive environment, guided by physicians, delivered by exceptional professionals and inspired by the communities we serve. Piedmont is a not-for-profit, community health system comprised of 25 hospitals and

Lehigh Valley Health Network (LVHN) is proudly part of Jefferson Health, forming a leading integrated academic health care delivery system. With 65,000 colleagues, 32 hospitals and over 700 sites of care across the Lehigh Valley, northeastern Pennsylvania, Delaware Valley and southern New Jersey. L

At Johnson & Johnson MedTech, we are working to solve the world’s most pressing healthcare challenges through innovations at the intersection of biology and technology. With deep expertise in surgery, orthopaedics, cardiovascular, and vision, we design healthcare solutions that are smarter, less inv

One of the largest Trusts in the UK, Guy’s and St Thomas’ NHS Foundation Trust comprises five of the UK’s best known hospitals – Guy’s, St Thomas’, Evelina London Children’s Hospital, Royal Brompton and Harefield – as well as community services in Lambeth and Southwark, all with a long history of hi

People at Allina Health have a career of making a difference in the lives of the millions of patients we see each year at our 90+ clinics, 12 hospitals and through a wide variety of specialty care services in Minnesota and western Wisconsin. We’re a not-for-profit organization committed to enrichin

Boston Children's Hospital is a 404-bed comprehensive center for pediatric health care. As one of the largest pediatric medical centers in the United States, Boston Children's offers a complete range of health care services for children from birth through 21 years of age. (Our services can begin int

Sentara Health, an integrated, not-for-profit health care delivery system, celebrates more than 135 years in pursuit of its mission - "we improve health every day." Sentara is one of the largest health systems in the U.S. Mid-Atlantic and Southeast, and among the top 20 largest not-for-profit integr

The University of Maryland Medical System (UMMS) was created in 1984 when the state-owned University Hospital became a private, nonprofit organization. It has evolved into a multi-hospital system with academic, community and specialty service missions reaching every part of the state and beyond. UM

UMass Memorial Health is the health and wellness partner of the people of Central Massachusetts. Through pain and pandemics, our commitment to our communities never wanes. We use knowledge and innovation to create breakthrough medicine, to create jobs, and to make life better for those we serve. We
.png)
CHIME Honors 18 Organizations for Achieving Highest Level of Digital Health Excellence in 2025 Digital Health Most Wired (DHMW) Survey...
Market Master Vijay Kedia has just added two less known stocks to his portfolio, both of which have logged in triple digit compounded profit...
Two Pacific Northwest hospitals systems are planning to come together. Image: Samaritan Health Services. The MultiCare Health System and...
MultiCare Health System and Samaritan Health Services look to combine the two nonprofit health systems, they announced Wednesday.
When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to...
MVP Health Care members are being targeted by a sophisticated phishing scam involving automated calls that falsely claim to be from the...
The 13-hospital network's CDS system also maintained stable patient experience scores – and data validated that cost reduction was achieved...
Discover the latest trends and growth areas in Tacoma's cybersecurity job market in Washington for 2025, from education to economic impact.
The marketing company and mailing vendor, Kaye-Smith Enterprises, has agreed to settle a class action lawsuit filed in response to a 2022 cyberattack and data...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MultiCare Health System is http://jobs.multicare.org.
According to Rankiteo, MultiCare Health System’s AI-generated cybersecurity score is 685, reflecting their Weak security posture.
According to Rankiteo, MultiCare Health System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MultiCare Health System is not certified under SOC 2 Type 1.
According to Rankiteo, MultiCare Health System does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MultiCare Health System is not listed as GDPR compliant.
According to Rankiteo, MultiCare Health System does not currently maintain PCI DSS compliance.
According to Rankiteo, MultiCare Health System is not compliant with HIPAA regulations.
According to Rankiteo,MultiCare Health System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MultiCare Health System operates primarily in the Hospitals and Health Care industry.
MultiCare Health System employs approximately 11,958 people worldwide.
MultiCare Health System presently has no subsidiaries across any sectors.
MultiCare Health System’s official LinkedIn profile has approximately 62,390 followers.
MultiCare Health System is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, MultiCare Health System does not have a profile on Crunchbase.
Yes, MultiCare Health System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/multicare-health-system.
As of November 27, 2025, Rankiteo reports that MultiCare Health System has experienced 3 cybersecurity incidents.
MultiCare Health System has an estimated 29,983 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Breach and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with equifax credit monitoring..
Title: Data Breach at MultiCare Health System
Description: MultiCare Health System in Washington suffered a third-party data breach that originated at its mailing service provider, Kaye-Smith. The breach impacted more than 23,000 individuals at MultiCare. The breached information included names, addresses, and Social Security numbers.
Type: Data Breach
Attack Vector: Third-party vendor compromise
Title: Ransomware Attack on MultiCare Health System
Description: A ransomware attack on MultiCare Health System impacted 302,769 Washington residents, compromising names, addresses, telephone numbers, and medical information.
Date Detected: 2020-02-07
Date Publicly Disclosed: 2020-08-21
Date Resolved: 2020-05-20
Type: Ransomware
Title: MultiCare Health System Data Breach
Description: MultiCare Health System, Inc. experienced an external system breach on May 18, 2022, due to hacking, affecting a total of 23,712 individuals, including 3 residents of Maine. The breach involved potential compromise of Social Security Numbers and identity theft protection services were offered for two years through Equifax credit monitoring.
Date Detected: 2022-05-18
Type: Data Breach
Attack Vector: Hacking
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Mailing service provider and Kaye-Smith.

Data Compromised: Names, Addresses, Social security numbers

Data Compromised: Names, Addresses, Telephone numbers, Medical information

Data Compromised: Social security numbers
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers, , Names, Addresses, Telephone Numbers, Medical Information, , Social Security Numbers and .

Entity Name: MultiCare Health System
Entity Type: Healthcare
Industry: Healthcare
Location: Washington
Customers Affected: 23000

Entity Name: MultiCare Health System
Entity Type: Healthcare
Industry: Healthcare
Location: Washington
Customers Affected: 302769

Entity Name: MultiCare Health System, Inc.
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 23712

Third Party Assistance: Equifax Credit Monitoring.
Third-Party Assistance: The company involves third-party assistance in incident response through Equifax credit monitoring, .

Type of Data Compromised: Names, Addresses, Social security numbers
Number of Records Exposed: 23000
Personally Identifiable Information: NamesAddressesSocial Security numbers

Type of Data Compromised: Names, Addresses, Telephone numbers, Medical information
Number of Records Exposed: 302769

Type of Data Compromised: Social security numbers
Number of Records Exposed: 23712
Sensitivity of Data: High
Personally Identifiable Information: Social Security Numbers

Source: Washington State Office of the Attorney General
Date Accessed: 2020-08-21

Source: Maine Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2020-08-21, and Source: Maine Office of the Attorney General.

Entry Point: Mailing service provider, Kaye-Smith
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Equifax Credit Monitoring, .
Most Recent Incident Detected: The most recent incident detected was on 2020-02-07.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-08-21.
Most Recent Incident Resolved: The most recent incident resolved was on 2020-05-20.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security numbers, , names, addresses, telephone numbers, medical information, , Social Security Numbers and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was equifax credit monitoring, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Social Security Numbers, Social Security numbers, addresses, medical information, telephone numbers, names and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.6K.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and Washington State Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Mailing service provider and Kaye-Smith.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.