Comparison Overview

Perthyn

VS

Health New Zealand | Waitaha Canterbury

Perthyn

Swansea, Wales SA7 9FG, GB, Swansea, Wales SA7 9FG, GB
Last Update: 2025-03-08 (UTC)
Between 800 and 900

Strong

Perthyn is the Welsh word for โ€œbelongingโ€. Perthynโ€™s primary activity is providing support to people with learning disabilities, autism and complex health and emotional support requirements, to enable them to fulfil their maximum individual potential and live full and valued lives in their communities. We are a registered charity and company limited by guarantee which is essentially funded by the Local Authorities and Health Boards of the areas within which we operate. Perthyn was formed in 1995 and is a โ€˜not for profitโ€™ charity based upon principles of delivering high quality person-centred care and support, and has consistently grown to become one of the largest and most highly-regarded charities in Wales. Perthyn has an annual turnover in excess of ยฃ20 million, employs over 550 staff, and provides support to people across Wales and England. Perthyn currently works in: Cardiff, Carmarthenshire, Pembrokeshire, Powys, Swansea, Shropshire and Nottinghamshire.

NAICS: 62
NAICS Definition:
Employees: 169
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Health New Zealand | Waitaha Canterbury

Last Update: 2025-03-14 (UTC)

Strong

Between 800 and 900

Health New Zealand - Waitaha Canterbury is transforming the delivery of health care services and is recognised in New Zealand and overseas for our extraordinary journey. We are leading the world delivering integrated and connected health care services that put patientโ€šร„รดs right at the heart. Every day our people are saving lives and taking care of our communities. Our transformation is based on the collective vision of one health system focused on providing 'the right care and support, to the right person, at the right time and in the right place.' This transformation means that we are now leading the world in innovative, integrated health care systems across primary, secondary and tertiary care. Some vital stats โ€šร„ยข South Islandโ€šร„รดs largest employer โ€šร„ยข 12th largest employer in New Zealand โ€šร„ยข New Zealandโ€šร„รดs 2nd largest health district โ€šร„ยข 14 hospitals and major health facilities โ€šร„ยข 7 territorial local authorities โ€šร„ยข Directly employ over 11,000 staff โ€šร„ยข Within our health system 19,000 people work to the benefit of 550,000 โ€šร„ยข Highest ED attendance rate in Australasia (114,000 people seen in ED last year) โ€šร„ยข Transformational development of new health facilities at Hillmorton Campus & at Christchurch Campus underway. We have a particularly close and longโ€šร„รชstanding relationship with Health New Zealand - Te Tai o Poutini West Coast, and the two health districts have established a formal transapline arrangement to enable closer clinical collaboration. As part of this arrangement, we share a joint District Director and senior clinical and management expertise.

NAICS: 62
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/perthyn.jpeg
Perthyn
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/canterbury-district-health-board.jpeg
Health New Zealand | Waitaha Canterbury
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Perthyn
100%
Compliance Rate
0/4 Standards Verified
Health New Zealand | Waitaha Canterbury
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Perthyn in 2025.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Health New Zealand | Waitaha Canterbury in 2025.

Incident History โ€” Perthyn (X = Date, Y = Severity)

Perthyn cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Health New Zealand | Waitaha Canterbury (X = Date, Y = Severity)

Health New Zealand | Waitaha Canterbury cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/perthyn.jpeg
Perthyn
Incidents

No Incident

https://images.rankiteo.com/companyimages/canterbury-district-health-board.jpeg
Health New Zealand | Waitaha Canterbury
Incidents

No Incident

FAQ

Both Perthyn company and Health New Zealand | Waitaha Canterbury company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Health New Zealand | Waitaha Canterbury company has disclosed a higher number of cyber incidents compared to Perthyn company.

In the current year, Health New Zealand | Waitaha Canterbury company and Perthyn company have not reported any cyber incidents.

Neither Health New Zealand | Waitaha Canterbury company nor Perthyn company has reported experiencing a ransomware attack publicly.

Neither Health New Zealand | Waitaha Canterbury company nor Perthyn company has reported experiencing a data breach publicly.

Neither Health New Zealand | Waitaha Canterbury company nor Perthyn company has reported experiencing targeted cyberattacks publicly.

Neither Perthyn company nor Health New Zealand | Waitaha Canterbury company has reported experiencing or disclosing vulnerabilities publicly.

Neither Perthyn company nor Health New Zealand | Waitaha Canterbury company has publicly disclosed detailed information about the number of their subsidiaries.

Perthyn company employs more people globally than Health New Zealand | Waitaha Canterbury company, reflecting its scale as a Hospitals and Health Care.

Latest Global CVEs (Not Company-Specific)

Description

Improper Protection Against Voltage and Clock Glitches in FPGA devices, could allow an attacker with physical access to undervolt the platform resulting in a loss of confidentiality.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.

Risk Information
cvss3
Base: 9.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.1.0 to before 2.3.0, the API endpoint GET /api/problems/:id returns challenge hints in plaintext within the question object, regardless of whether the user has unlocked them via point deduction. Users can view all hints for free, undermining the business logic of the platform and reducing the integrity of the challenge system. This issue has been patched in version 2.3.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

Flag Forge is a Capture The Flag (CTF) platform. In version 2.1.0, the /api/admin/assign-badge endpoint lacks proper access control, allowing any authenticated user to assign high-privilege badges (e.g., Staff) to themselves. This could lead to privilege escalation and impersonation of administrative roles. This issue has been patched in version 2.2.0.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Description

parse is a package designed to parse JavaScript SDK. A Prototype Pollution vulnerability in the SingleInstanceStateController.initializeState function of parse version 5.3.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.