ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Poplar Bluff Regional Medical Center (PBRMC) is located in the heart of Southeast Missouri in Poplar Bluff and serves Butler County and seven other surrounding counties. PBRMC is committed to meeting our community’s healthcare needs by providing compassionate, quality patient care. The medical center offers a wide range of services, including oncology, cardiology, orthopedics, robotic surgery, women’s health and more. Learn more at PBRMC.com

Poplar Bluff Regional Medical Center A.I CyberSecurity Scoring

PBRMC

Company Details

Linkedin ID:

pbrmc

Employees number:

498

Number of followers:

1,565

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

linktr.ee

IP Addresses:

0

Company ID:

POP_1055409

Scan Status:

In-progress

AI scorePBRMC Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/pbrmc.jpeg
PBRMC Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePBRMC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/pbrmc.jpeg
PBRMC Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PBRMC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Poplar Bluff Regional Medical CenterData Leak8533/2020
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee was struck down due to a tornado on March 3, 2020. It led to potentially inappropriate disclosure of personal information. STAT is based in Waupaca, Wisconsin, and provides various secure record services to healthcare entities. Poplar Bluff Regional Medical Center contracts with STAT to scan paper documents into the hospital’s electronic medical record system and for secure destruction of records. The records stored in the building damaged by the tornado contained medical records, which included personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications, and/or other types of information typically found in a medical record. STAT notified Poplar Bluff Regional Medical Center on March 3, 2020, of this incident. In an effort to prevent unauthorized access and disclosure of records involved, a tall fence was erected around the property and two security guards were posted 24 hours a day, seven days a week.

Poplar Bluff Regional Medical Center
Data Leak
Severity: 85
Impact: 3
Seen: 3/2020
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: A building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee was struck down due to a tornado on March 3, 2020. It led to potentially inappropriate disclosure of personal information. STAT is based in Waupaca, Wisconsin, and provides various secure record services to healthcare entities. Poplar Bluff Regional Medical Center contracts with STAT to scan paper documents into the hospital’s electronic medical record system and for secure destruction of records. The records stored in the building damaged by the tornado contained medical records, which included personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications, and/or other types of information typically found in a medical record. STAT notified Poplar Bluff Regional Medical Center on March 3, 2020, of this incident. In an effort to prevent unauthorized access and disclosure of records involved, a tall fence was erected around the property and two security guards were posted 24 hours a day, seven days a week.

Ailogo

PBRMC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PBRMC

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Poplar Bluff Regional Medical Center in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Poplar Bluff Regional Medical Center in 2025.

Incident Types PBRMC vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Poplar Bluff Regional Medical Center in 2025.

Incident History — PBRMC (X = Date, Y = Severity)

PBRMC cyber incidents detection timeline including parent company and subsidiaries

PBRMC Company Subsidiaries

SubsidiaryImage

Poplar Bluff Regional Medical Center (PBRMC) is located in the heart of Southeast Missouri in Poplar Bluff and serves Butler County and seven other surrounding counties. PBRMC is committed to meeting our community’s healthcare needs by providing compassionate, quality patient care. The medical center offers a wide range of services, including oncology, cardiology, orthopedics, robotic surgery, women’s health and more. Learn more at PBRMC.com

Loading...
similarCompanies

PBRMC Similar Companies

Baylor Scott & White Health

With us by your side, there's no stopping you. It's why we're creating a new kind of healthcare at Baylor Scott & White. And we're just getting started. As the largest not-for-profit health system in the state of Texas, Baylor Scott & White promotes the health and well-being of every individual, fa

UAB Medicine

As a nationally ranked academic medical center and one of Alabama’s largest employers, UAB Medicine is about teamwork, support, mentorship, and collaboration. Employees are empowered to lead, learn, and innovate as they deliver world-class care to every patient, every family, every time. When you ar

Ramsay Health Care

Ramsay Health Care is a trusted provider of private hospital and healthcare services in Australia, Europe and the United Kingdom. Every year, millions of patients put their trust in Ramsay, confident in our ability to deliver safe, high-quality healthcare with outstanding clinical outcomes. We ope

Dignity Health

We provide quality, compassionate health care at more than 40 hospitals and care centers that are serving communities across California, Arizona and Nevada every minute of every day. And while not everyone may live near a major medical facility, Dignity Health is making health care more accessible b

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita

Emory Healthcare

Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai

A Dasa é a maior rede de saúde integrada do Brasil. Faz parte da vida de mais de 20 milhões de pessoas por ano, com alta tecnologia, experiência intuitiva e atitude à frente do tempo. Com mais de 50 mil colaboradores e 250 mil médicos parceiros, existe para ser a saúde que as pessoas desejam e que

City of Hope

City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes

Zuellig Pharma

Zuellig Pharma is a leading integrated healthcare solutions company in Asia with experience spanning over a century in the region. Partnering with multinational pharmaceutical manufacturers, governments, healthcare providers, and professionals, we broaden access to pharmaceutical and healthcare prod

newsone

PBRMC CyberSecurity News

October 06, 2025 05:15 AM
2010-2019

2010. January 18. Southeast Missouri State University announces the launch of a first new website for mobile users. May 2010. Inaugurated new summer faculty...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PBRMC CyberSecurity History Information

Official Website of Poplar Bluff Regional Medical Center

The official website of Poplar Bluff Regional Medical Center is https://linktr.ee/pbrmc.

Poplar Bluff Regional Medical Center’s AI-Generated Cybersecurity Score

According to Rankiteo, Poplar Bluff Regional Medical Center’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.

How many security badges does Poplar Bluff Regional Medical Center’ have ?

According to Rankiteo, Poplar Bluff Regional Medical Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Poplar Bluff Regional Medical Center have SOC 2 Type 1 certification ?

According to Rankiteo, Poplar Bluff Regional Medical Center is not certified under SOC 2 Type 1.

Does Poplar Bluff Regional Medical Center have SOC 2 Type 2 certification ?

According to Rankiteo, Poplar Bluff Regional Medical Center does not hold a SOC 2 Type 2 certification.

Does Poplar Bluff Regional Medical Center comply with GDPR ?

According to Rankiteo, Poplar Bluff Regional Medical Center is not listed as GDPR compliant.

Does Poplar Bluff Regional Medical Center have PCI DSS certification ?

According to Rankiteo, Poplar Bluff Regional Medical Center does not currently maintain PCI DSS compliance.

Does Poplar Bluff Regional Medical Center comply with HIPAA ?

According to Rankiteo, Poplar Bluff Regional Medical Center is not compliant with HIPAA regulations.

Does Poplar Bluff Regional Medical Center have ISO 27001 certification ?

According to Rankiteo,Poplar Bluff Regional Medical Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Poplar Bluff Regional Medical Center

Poplar Bluff Regional Medical Center operates primarily in the Hospitals and Health Care industry.

Number of Employees at Poplar Bluff Regional Medical Center

Poplar Bluff Regional Medical Center employs approximately 498 people worldwide.

Subsidiaries Owned by Poplar Bluff Regional Medical Center

Poplar Bluff Regional Medical Center presently has no subsidiaries across any sectors.

Poplar Bluff Regional Medical Center’s LinkedIn Followers

Poplar Bluff Regional Medical Center’s official LinkedIn profile has approximately 1,565 followers.

NAICS Classification of Poplar Bluff Regional Medical Center

Poplar Bluff Regional Medical Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Poplar Bluff Regional Medical Center’s Presence on Crunchbase

No, Poplar Bluff Regional Medical Center does not have a profile on Crunchbase.

Poplar Bluff Regional Medical Center’s Presence on LinkedIn

Yes, Poplar Bluff Regional Medical Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pbrmc.

Cybersecurity Incidents Involving Poplar Bluff Regional Medical Center

As of December 18, 2025, Rankiteo reports that Poplar Bluff Regional Medical Center has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Poplar Bluff Regional Medical Center has an estimated 31,340 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Poplar Bluff Regional Medical Center ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

How does Poplar Bluff Regional Medical Center detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with a tall fence was erected around the property, containment measures with two security guards were posted 24 hours a day, seven days a week..

Incident Details

Can you provide details on each incident ?

Incident : Natural Disaster

Title: Tornado Damage Leads to Potential Disclosure of Medical Records

Description: A building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee was struck down due to a tornado on March 3, 2020. It led to potentially inappropriate disclosure of personal information.

Date Detected: 2020-03-03

Type: Natural Disaster

Attack Vector: Physical Damage

Threat Actor: Natural Disaster

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident ?

Incident : Natural Disaster POP1844291222

Data Compromised: Medical records, Personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Medical Records, Personal Information and .

Which entities were affected by each incident ?

Incident : Natural Disaster POP1844291222

Entity Name: Poplar Bluff Regional Medical Center

Entity Type: Healthcare Entity

Industry: Healthcare

Location: Poplar Bluff

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Natural Disaster POP1844291222

Containment Measures: A tall fence was erected around the propertyTwo security guards were posted 24 hours a day, seven days a week

Data Breach Information

What type of data was compromised in each breach ?

Incident : Natural Disaster POP1844291222

Type of Data Compromised: Medical records, Personal information

Sensitivity of Data: High

Personally Identifiable Information: full namesocial security numberaddressdate of birthmedical record numberaccount numberimagesdiagnosesnursing and physician documentationtest resultsmedications

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by a tall fence was erected around the property, two security guards were posted 24 hours a day, seven days a week and .

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Natural Disaster POP1844291222

Root Causes: Tornado Damage

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Natural Disaster.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-03-03.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were medical records, personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were A tall fence was erected around the propertyTwo security guards were posted 24 hours a day and seven days a week.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical records, personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results and medications.

cve

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=pbrmc' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge