ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Prime Source Expense Experts is a purchasing solution for many healthcare providers and facilities, including Skilled Nursing, Assisted Living Centers and Hospitals. By utilizing our managed services, you will take advantage of our wide selection of GPO contracts offered to maximize your savings. Through the power of our network of vendors, manufacturers and affiliates, Prime Source GPO members receive the best prices every day. You will find double-digit savings on a wide range of products and services for every department in your facility, including Nursing, Dietary, Housekeeping, Maintenance, Office and more. Prime Source’s highly trained and dedicated team of purchasing specialists constantly monitor market trends and work with vendors and affiliates to provide lower pricing and better service. By taking advantage of the Prime Source's contracts your facility will see an increase in the quality of products while enjoying a reduction in cost.

Prime Source A.I CyberSecurity Scoring

Prime Source

Company Details

Linkedin ID:

primesourcex

Employees number:

81

Number of followers:

3,175

NAICS:

623

Industry Type:

Nursing Homes and Residential Care Facilities

Homepage:

primesourcex.com

IP Addresses:

0

Company ID:

PRI_2765183

Scan Status:

In-progress

AI scorePrime Source Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/primesourcex.jpeg
Prime Source Nursing Homes and Residential Care Facilities
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePrime Source Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/primesourcex.jpeg
Prime Source Nursing Homes and Residential Care Facilities
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Prime Source Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Prime Source Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Prime Source

Incidents vs Nursing Homes and Residential Care Facilities Industry Average (This Year)

No incidents recorded for Prime Source in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Prime Source in 2025.

Incident Types Prime Source vs Nursing Homes and Residential Care Facilities Industry Avg (This Year)

No incidents recorded for Prime Source in 2025.

Incident History — Prime Source (X = Date, Y = Severity)

Prime Source cyber incidents detection timeline including parent company and subsidiaries

Prime Source Company Subsidiaries

SubsidiaryImage

Prime Source Expense Experts is a purchasing solution for many healthcare providers and facilities, including Skilled Nursing, Assisted Living Centers and Hospitals. By utilizing our managed services, you will take advantage of our wide selection of GPO contracts offered to maximize your savings. Through the power of our network of vendors, manufacturers and affiliates, Prime Source GPO members receive the best prices every day. You will find double-digit savings on a wide range of products and services for every department in your facility, including Nursing, Dietary, Housekeeping, Maintenance, Office and more. Prime Source’s highly trained and dedicated team of purchasing specialists constantly monitor market trends and work with vendors and affiliates to provide lower pricing and better service. By taking advantage of the Prime Source's contracts your facility will see an increase in the quality of products while enjoying a reduction in cost.

Loading...
similarCompanies

Prime Source Similar Companies

Evergreen Healthcare Group

Evergreen Healthcare Group is proud to provide management consulting and other services to skilled nursing homes and assisted living communities located in the North West United States. The teams at each community provide a broad spectrum of healthcare and related services including but not limited

Pacific Care Limited

When Pacific Care was founded in 1998 our key priority was to provide a level of care that we ourselves would want to receive and to create an environment where we would be happy to work. These guiding principals are at the heart of everything we do. Pacific Care is a care home group based out of G

MealSuite

MealSuite is a fully integrated, end to end, dietary, food production, inventory, kitchen management and point of sale solution on a mission to revolutionize the continuum of care through food service technology. Since 1989, our industry leading innovations have empowered food service operators ac

Aria Care

We provide the very best in residential care, nursing care and dementia care for those who need help and support, through an amazing portfolio of some 50 homes located in England, Scotland and Jersey. We are passionate about the individual care for our residents. Understanding their rich and colour

Oakland Care - Careers

When you join Oakland Care you are joining a company that is creating an exciting new generation of luxurious care homes in the UK – all backed by a wealth of experience in delivering excellent care. We believe every team member becomes part of our family. Like any family, we are all reliant on eac

Lewisville Estates Senior Living

Our residents know that they come first from the minute they walk through the doors of Lewisville Estates. We love them as they are our own family! Our assisted and independent senior living community is Award Winning. At Lewisville Estates, we offer a resort style retirement unlike any other. Our

newsone

Prime Source CyberSecurity News

December 13, 2025 12:11 AM
A comprehensive list of 2025 tech layoffs

The tech layoff wave is still kicking in 2025. Last year saw more than 150,000 job cuts across 549 companies, according to independent...

December 02, 2025 08:00 AM
Exclusive: Apple to resist India order to preload state-run app as political outcry builds

Apple does not plan to comply with a mandate to preload its smartphones with a state-owned cyber safety app and will convey its concerns to...

November 18, 2025 08:00 AM
Best Online Bachelor’s Degrees In Cybersecurity Of 2025

As a cybersecurity major, you'll learn how to identify and defend against cyberthreats and attacks as you put your skills to work in...

November 16, 2025 08:00 AM
20 Emerging Cybersecurity Trends to Watch Out in 2026

Stay ahead of threats with the latest Cybersecurity Trends. Discover cutting-edge strategies and technologies shaping the future of...

November 15, 2025 08:00 AM
Security News This Week: A Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets

Plus: State-sponsored AI hacking is here, Google hosts a CBP face recognition app, and more of the week's top security news.

November 11, 2025 08:00 AM
Top 40 Cyber Security Projects to Boost Your Skills (2026)

Top Cyber Security Projects: 1. Cybersecurity Incident Response Simulation Tool 2. Biometric Authentication System 3.

October 26, 2025 07:00 AM
Healthcare Data Breach Statistics

In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.

October 16, 2025 07:00 AM
Auto sector faces historic cyber threats to business continuity

A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business...

October 15, 2025 07:00 AM
Cybersecurity order warns of "imminent risk" to federal agencies following possible breach

Officials warned that attackers could exploit the vulnerabilities to steal credentials, move laterally through networks, and potentially...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Prime Source CyberSecurity History Information

Official Website of Prime Source

The official website of Prime Source is http://www.primesourcex.com.

Prime Source’s AI-Generated Cybersecurity Score

According to Rankiteo, Prime Source’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does Prime Source’ have ?

According to Rankiteo, Prime Source currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Prime Source have SOC 2 Type 1 certification ?

According to Rankiteo, Prime Source is not certified under SOC 2 Type 1.

Does Prime Source have SOC 2 Type 2 certification ?

According to Rankiteo, Prime Source does not hold a SOC 2 Type 2 certification.

Does Prime Source comply with GDPR ?

According to Rankiteo, Prime Source is not listed as GDPR compliant.

Does Prime Source have PCI DSS certification ?

According to Rankiteo, Prime Source does not currently maintain PCI DSS compliance.

Does Prime Source comply with HIPAA ?

According to Rankiteo, Prime Source is not compliant with HIPAA regulations.

Does Prime Source have ISO 27001 certification ?

According to Rankiteo,Prime Source is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Prime Source

Prime Source operates primarily in the Nursing Homes and Residential Care Facilities industry.

Number of Employees at Prime Source

Prime Source employs approximately 81 people worldwide.

Subsidiaries Owned by Prime Source

Prime Source presently has no subsidiaries across any sectors.

Prime Source’s LinkedIn Followers

Prime Source’s official LinkedIn profile has approximately 3,175 followers.

NAICS Classification of Prime Source

Prime Source is classified under the NAICS code 623, which corresponds to Nursing Homes and Residential Care Facilities.

Prime Source’s Presence on Crunchbase

No, Prime Source does not have a profile on Crunchbase.

Prime Source’s Presence on LinkedIn

Yes, Prime Source maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/primesourcex.

Cybersecurity Incidents Involving Prime Source

As of December 24, 2025, Rankiteo reports that Prime Source has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Prime Source has an estimated 100 peer or competitor companies worldwide.

Prime Source CyberSecurity History Information

How many cyber incidents has Prime Source faced ?

Total Incidents: According to Rankiteo, Prime Source has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Prime Source ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.

Risk Information
cvss4
Base: 8.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.

Risk Information
cvss3
Base: 9.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3

Risk Information
cvss3
Base: 8.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Description

LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=primesourcex' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge