Company Details
poisoncontrol
21
366
62
poison.org
0
NAT_1953358
In-progress

National Capital Poison Center Company CyberSecurity Posture
poison.orgThe National Capital Poison Center, founded in 1980, is an independent, private, 501(c)(3) not-for-profit organization and an accredited poison center. Its nurse and pharmacist Certified Specialists in Poison Information provide 24/7 telephone guidance for poison emergencies, free of charge. It also provides online guidance for poison emergencies through the webPOISONCONTROL tool (www.webpoisoncontrol.org), health professional education in toxicology, and poisoning prevention education. Service focuses on the metro DC area with a national scope for projects such as webPOISONCONTROL and The Poison Post® (www.poison.org/the-poison-post). The mission of National Capital Poison Center is to prevent poisonings, save lives, and limit injury from poisoning. In addition to saving lives, Poison Control decreases health care costs for poisoning cases. In 2015, the 55 U.S. poison control centers provided telephone guidance for nearly 2.2 million human poison exposures.
Company Details
poisoncontrol
21
366
62
poison.org
0
NAT_1953358
In-progress
Between 750 and 799

NCPC Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving the National Capital Poison Center (NCPC) on December 8, 2017. The breach occurred on October 21, 2017, possibly involving unauthorized access to a database containing information collected during calls from 1997 to October 21, 2017. Although it is unknown how many individuals were affected, the breach potentially compromised sensitive information collected over a span of two decades.
Description: National Capital Poison suffered from a ransomware attack that involved records of people who called them between January 1, 1997, and October 21, 2017. There have been no reports of actual or attempted misuse of the information, and NCPC is unable to determine whether any of the data in the database was accessed improperly. If the information was provided, the database server includes one or more of the following types of information: caller name, name of the person who may have been exposed to a poison and date of birth, address and phone number, details about the exposure and clinical course, recommendations made to the caller, caller's email address, and, if applicable, treating facility name and medical record number. NCPC did not indicate whether they paid any ransom or whether they attempted to restore from backup.


No incidents recorded for National Capital Poison Center in 2025.
No incidents recorded for National Capital Poison Center in 2025.
No incidents recorded for National Capital Poison Center in 2025.
NCPC cyber incidents detection timeline including parent company and subsidiaries

The National Capital Poison Center, founded in 1980, is an independent, private, 501(c)(3) not-for-profit organization and an accredited poison center. Its nurse and pharmacist Certified Specialists in Poison Information provide 24/7 telephone guidance for poison emergencies, free of charge. It also provides online guidance for poison emergencies through the webPOISONCONTROL tool (www.webpoisoncontrol.org), health professional education in toxicology, and poisoning prevention education. Service focuses on the metro DC area with a national scope for projects such as webPOISONCONTROL and The Poison Post® (www.poison.org/the-poison-post). The mission of National Capital Poison Center is to prevent poisonings, save lives, and limit injury from poisoning. In addition to saving lives, Poison Control decreases health care costs for poisoning cases. In 2015, the 55 U.S. poison control centers provided telephone guidance for nearly 2.2 million human poison exposures.

For more than 100 years, Children’s Healthcare of Atlanta has depended on clinical and nonclinical employees to help make kids better today and healthier tomorrow. Consistently ranked as one of the leading pediatric healthcare systems in the country by U.S. News & World Report, Children’s is the onl

A Amil é uma empresa do setor de saúde que atua no Brasil combinando expertise e liderança para coordenar todos os agentes desse mercado - criando relações sustentáveis para conhecer e atender às necessidades de cada cliente e permitir que ele aproveite o melhor da vida. Diariamente, nos preocupamo

Queensland Health is the state's largest healthcare provider. We are committed to ensuring all Queenslanders have access to a range of public healthcare services aimed at achieving good health and well-being. Through a network of 16 Hospital and Health Services, as well as the Mater Hospitals, Quee

Adventist Health is a faith-inspired, nonprofit integrated health system serving more than 100 communities on the West Coast and Hawaii with over 440 sites of care. Founded on Adventist heritage and values, Adventist Health provides care in hospitals, clinics, home care agencies, hospice agencies, a

At OHSU, we deliver breakthroughs for better health. We're driven by the belief that better health starts with innovations in the lab, in the classroom, at the bedside and in our communities. From cancer to Alzheimer's to cardiovascular care, we collaborate every day to identify and deliver new wa

Siemens Healthineers is a leading medtech company with over 125 years of experience. We pioneer breakthroughs in healthcare. For everyone. Everywhere. Sustainably. Our portfolio, spanning in vitro and in vivo diagnostics to image-guided therapy and cancer care, is crucial for clinical decision-makin
RWJBarnabas Health is New Jersey’s largest and most comprehensive academic health system, caring for more than 5 million people annually. Nationally renowned for quality and safety, the system includes 14 hospitals and 9,000 affiliated physicians integrated to provide care at more than 700 patient

Molina Healthcare is a FORTUNE 500 company that is focused exclusively on government-sponsored health care programs for families and individuals who qualify for government sponsored health care. Molina Healthcare contracts with state governments and serves as a health plan providing a wide range o

Sanford Health is the largest rural health system in the U.S. Our organization is dedicated to transforming the health care experience and providing access to world-class health care in America’s heartland. Headquartered in Sioux Falls, South Dakota, we serve more than one million patients and 220,0
.png)
Poinsettias are the ultimate festive houseplant, but they might be causing more trouble than they're worth. At least, that's what the...
The US Food and Drug Administration (FDA) has issued a recall on hundreds of cases of bread due to "Glass fragment found on top of bread."
EPAM holds a 10-year partnership with National Capital Poison Center (NCPC) to maintain and enhance webPOISONCONTROL, a lifesaving poison triage app.
The Trump administration ordered temporary freezes in funding for programs spanning virtually every part of the government.
Safety experts are issuing a warning about a popular social media trend that involves household chemicals found in many of our homes.
Find out if holly berries are poisonous to pets or small children and get expert tips on avoiding any harm.
Liam Payne's may not have been intentional and could have been caused by high-purity drugs. In Touch has learned that the specific...
The National Capital Poison Center describes the drug as a powdered cocktail of drugs, typically including ecstasy, ketamine, caffeine and a psychedelic drug...
The world was left in shock when Liam Payne died at the age of 31 in October 2024. Less than one week after his death, his partial autopsy...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of National Capital Poison Center is http://www.poison.org.
According to Rankiteo, National Capital Poison Center’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, National Capital Poison Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, National Capital Poison Center is not certified under SOC 2 Type 1.
According to Rankiteo, National Capital Poison Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, National Capital Poison Center is not listed as GDPR compliant.
According to Rankiteo, National Capital Poison Center does not currently maintain PCI DSS compliance.
According to Rankiteo, National Capital Poison Center is not compliant with HIPAA regulations.
According to Rankiteo,National Capital Poison Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
National Capital Poison Center operates primarily in the Hospitals and Health Care industry.
National Capital Poison Center employs approximately 21 people worldwide.
National Capital Poison Center presently has no subsidiaries across any sectors.
National Capital Poison Center’s official LinkedIn profile has approximately 366 followers.
National Capital Poison Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, National Capital Poison Center does not have a profile on Crunchbase.
Yes, National Capital Poison Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/poisoncontrol.
As of December 14, 2025, Rankiteo reports that National Capital Poison Center has experienced 2 cybersecurity incidents.
National Capital Poison Center has an estimated 31,138 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.
Title: Ransomware Attack on National Capital Poison Control
Description: National Capital Poison Control suffered from a ransomware attack that involved records of people who called them between January 1, 1997, and October 21, 2017. There have been no reports of actual or attempted misuse of the information, and NCPC is unable to determine whether any of the data in the database was accessed improperly.
Type: Ransomware
Title: National Capital Poison Center Data Breach
Description: The California Office of the Attorney General reported a data breach involving the National Capital Poison Center (NCPC) on December 8, 2017. The breach occurred on October 21, 2017, possibly involving unauthorized access to a database containing information collected during calls from 1997 to October 21, 2017, although it is unknown how many individuals were affected.
Date Detected: 2017-10-21
Date Publicly Disclosed: 2017-12-08
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Caller name, Name of the person who may have been exposed to a poison and date of birth, Address and phone number, Details about the exposure and clinical course, Recommendations made to the caller, Caller's email address, Treating facility name, Medical record number

Data Compromised: Information collected during calls from 1997 to October 21, 2017
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Caller Name, Name Of The Person Who May Have Been Exposed To A Poison And Date Of Birth, Address And Phone Number, Details About The Exposure And Clinical Course, Recommendations Made To The Caller, Caller'S Email Address, Treating Facility Name, Medical Record Number, and Call information.

Entity Name: National Capital Poison Control
Entity Type: Non-profit
Industry: Healthcare

Entity Name: National Capital Poison Center
Entity Type: Organization
Industry: Healthcare
Location: California

Type of Data Compromised: Caller name, Name of the person who may have been exposed to a poison and date of birth, Address and phone number, Details about the exposure and clinical course, Recommendations made to the caller, Caller's email address, Treating facility name, Medical record number

Type of Data Compromised: Call information

Source: California Office of the Attorney General
Date Accessed: 2017-12-08
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2017-12-08.
Most Recent Incident Detected: The most recent incident detected was on 2017-10-21.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-12-08.
Most Significant Data Compromised: The most significant data compromised in an incident were caller name, name of the person who may have been exposed to a poison and date of birth, address and phone number, details about the exposure and clinical course, recommendations made to the caller, caller's email address, treating facility name, medical record number, , Information collected during calls from 1997 to October 21 and 2017.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were address and phone number, recommendations made to the caller, medical record number, caller name, treating facility name, name of the person who may have been exposed to a poison and date of birth, details about the exposure and clinical course, Information collected during calls from 1997 to October 21, 2017 and caller's email address.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.