
Nordstrom Company Cyber Security Posture
nordstrom.comAt Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all levels of the organization. These well-traveled paths show how hard work, loyalty, a competitive spirit and your unwavering commitment to the customer can take you and your career to new places. In addition to being a great place to have a career, weโre also committed to respecting the environment and supporting our communities. To learn more, check out NordstromCares.com. Interested in joining the Nordstrom team? See some of our current opportunities under our Careers tab or visit careers.nordstrom.com to apply today.
Nordstrom Company Details
nordstrom
45230 employees
591465.0
452
Retail
nordstrom.com
Scan still pending
NOR_1452719
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Nordstrom Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Nordstrom Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Nordstrom, Inc. | Breach | 60 | 3 | 10/2018 | NOR609072725 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: On November 5, 2018, the California Attorney General reported a data breach involving Nordstrom, Inc. The breach occurred on October 9, 2018, due to improper handling of employee data by a contract worker, potentially affecting names, Social Security numbers, and other personal information. No customer data was impacted, and the company has taken measures to prevent future incidents. |
Nordstrom Company Subsidiaries

At Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all levels of the organization. These well-traveled paths show how hard work, loyalty, a competitive spirit and your unwavering commitment to the customer can take you and your career to new places. In addition to being a great place to have a career, weโre also committed to respecting the environment and supporting our communities. To learn more, check out NordstromCares.com. Interested in joining the Nordstrom team? See some of our current opportunities under our Careers tab or visit careers.nordstrom.com to apply today.
Access Data Using Our API

Get company history
.png)
Nordstrom Cyber Security News
Kimco Expands Premium Retail Portfolio: Nordstrom Rack Joining El Camino Promenade in Strategic San Diego Move
The 24,000-square-foot store will be located at El Camino Promenade, a popular shopping center that includes TJ Maxx, Bevo, Five Below andย ...
Nordstrom faces class-action lawsuit over $6.25 billion buyout deal
The lawsuit alleges Nordstrom CEO Erik Nordstrom and Chief Brand Officer Peter Nordstrom in 2023 pushed the board to consider a sale, afterย ...
Nordstrom SWOT Analysis (2025)
The Nordstrom SWOT Analysis reveals a multifaceted retail titan that has consistently excelled in delivering customer service andย ...
Nordstrom Shareholders Approve Merger With Mexicoโs Liverpool
Shareholders of the US department store chain Nordstrom have approved its merger with Mexico-based retailer El Puerto de Liverpool, a US$6.2ย ...
Foh&Boh data leak leaves millions of CVs exposed - KFS, Taco Bell, Nordstrom applicants at risk
A dataset containing a staggering 5.4 million files has been discovered by researchers online, and is believed to be primarily CVs (resumes)ย ...
These Stocks Moved the Most Today: Dell, HP Inc., CrowdStrike, Urban Outfitters, Symbotic, Nordstrom, and More
HP Inc. declined 11% after the maker of personal computers and printers reported fiscal fourth-quarter earnings that matched Wall Streetย ...
Nordstrom Hires Cybersecurity Exec
Nordstrom names Nicole Ford chief information security officer.
Tech Moves: Nordstrom names chief information security officer; Meta research scientist joins AI2
Nicole Ford. (Nordstrom Photo) โ Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as viceย ...
Nordstrom shares climb 5% as earnings top estimates, but retailer issues cautious guidance
During the quarter, Nordstrom's profits fell compared to the same period a year ago, but earnings grew over the past six months. Last year,ย ...

Nordstrom Similar Companies

PT. Trans Retail Indonesia
Pada bulan Januari 2013, Trans Corp melalui anak perusahaannya, PT Trans Ritel mengambil alih 100% saham PT Carrefour Indonesia sehingga nama perusahaan pun berubah menjadi PT Trans Retail Indonesia. PT Trans Retail Indonesia berinovasi dalam memberikan standar pelayanan kelas dunia di industri r

Ulta Beauty
At Ulta Beauty (NASDAQ: ULTA), the possibilities are beautiful. Ulta Beauty is the largest U.S. beauty retailer and the premier beauty destination for cosmetics, fragrance, skin care products, hair care products and salon services. In 1990, the Company reinvented the beauty retail experience by offe

B&M Retail
B&M is a fast-growing discount retailer, operating from over 750 high street and out of town stores across the UK, with a team of over 38,000! In the UK, we offer customers a broad range of FMCG brands and non-grocery products at sensational prices. Our aim is to provide customers with a fun and e

Bath & Body Works
We make the world a brighter, happier place through the power of fragrance. This idea is what we were founded on, and itโs at the heart of everything we do. Weโre a team that cares about our customers and believes in giving them a reason to celebrate with fragrance every day. We are committed to

Majid Al Futtaim
Founded in 1992, Majid Al Futtaim is an Emirati-owned, diversified lifestyle conglomerate operating across the Middle East, Africa and Asia. The Group started from one manโs vision to transform the face of shopping, entertainment, and leisure to โCreate Great Moments For Everyone, Everydayโ. It has

Meijer
It takes guts to start a business during the Great Depression. And it takes vision to keep it going. Our founder, Hendrik Meijer, opened Thrifty Acres in 1934. Almost thirty years later, his son, Fred, pioneered the worldโs first ever supercenter โ setting the table for who we are today: a multi-bil

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Nordstrom CyberSecurity History Information
How many cyber incidents has Nordstrom faced?
Total Incidents: According to Rankiteo, Nordstrom has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Nordstrom?
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
How does Nordstrom detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with measures taken to prevent future incidents.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Nordstrom Data Breach
Description: A data breach involving Nordstrom, Inc. occurred due to improper handling of employee data by a contract worker, potentially affecting names, Social Security numbers, and other personal information.
Date Detected: 2018-11-05
Date Publicly Disclosed: 2018-11-05
Type: Data Breach
Attack Vector: Improper handling of employee data
Vulnerability Exploited: Human error
Threat Actor: Contract worker
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach NOR609072725
Data Compromised: Names, Social Security numbers, Other personal information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security numbers and Other personal information.
Which entities were affected by each incident?

Incident : Data Breach NOR609072725
Entity Type: Retail
Industry: Retail
Location: California
Customers Affected: None
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach NOR609072725
Remediation Measures: Measures taken to prevent future incidents
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach NOR609072725
Type of Data Compromised: Names, Social Security numbers, Other personal information
Sensitivity of Data: High
Personally Identifiable Information: Yes
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Measures taken to prevent future incidents.
References
Where can I find more information about each incident?
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Attorney GeneralDate Accessed: 2018-11-05.
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Data Breach NOR609072725
Root Causes: Improper handling of employee data by a contract worker
Corrective Actions: Measures taken to prevent future incidents
What corrective actions has the company taken based on post-incident analysis?
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Measures taken to prevent future incidents.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Contract worker.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2018-11-05.
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2018-11-05.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers and Other personal information.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Social Security numbers and Other personal information.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is California Attorney General.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
