ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.

Rangely District Hospital A.I CyberSecurity Scoring

RDH

Company Details

Linkedin ID:

rangely-district-hospital

Employees number:

66

Number of followers:

238

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

rangelyhospital.org

IP Addresses:

0

Company ID:

RAN_1076964

Scan Status:

In-progress

AI scoreRDH Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/rangely-district-hospital.jpeg
RDH Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreRDH Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/rangely-district-hospital.jpeg
RDH Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

RDH Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Rangely District HospitalRansomware8548/2012
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospital’s computer network were attacked by ransomware, including some files containing patients’ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.

Rangely District Hospital
Ransomware
Severity: 85
Impact: 4
Seen: 8/2012
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospital’s computer network were attacked by ransomware, including some files containing patients’ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.

Ailogo

RDH Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for RDH

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Rangely District Hospital in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Rangely District Hospital in 2025.

Incident Types RDH vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Rangely District Hospital in 2025.

Incident History — RDH (X = Date, Y = Severity)

RDH cyber incidents detection timeline including parent company and subsidiaries

RDH Company Subsidiaries

SubsidiaryImage

Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.

Loading...
similarCompanies

RDH Similar Companies

Atrium Health

Atrium Health, part of Advocate Health, is redefining how, when and where care is delivered. We are rethinking methods of care delivery to reach more people and bringing human kindness to every step of their health journey. Our dedication to elevating health care for every individual, every teammate

Select Medical

Select Medical made a commitment more than 20 years ago to deliver an exceptional patient care experience that promotes healing and recovery in a compassionate environment. We have honored that promise by helping define the nation's standard of excellence in specialized hospital and rehabilitative c

We are a strong, passionate team of more than 12,500 who take pride in caring for every person who comes through our doors. We lift each other up so we can provide the very best and safest care to those who need us most. Together. Every day. With the support of our university, we make up an acade

Johns Hopkins Medicine

Johns Hopkins Medicine is a governing structure for the University’s School of Medicine and the health system, coordinating their research, teaching, patient care, and related enterprises. The Johns Hopkins Hospital opened in 1889, followed four years later by the university’s School of Medicine

DaVita Kidney Care

DaVita means “to give life,” reflecting our proud history as leaders in dialysis—an essential, life-sustaining treatment for those living with end stage kidney disease (ESKD). Today, our mission is to minimize the devastating impacts of kidney disease across the full spectrum of kidney health care.

Mount Sinai Health System

The Mount Sinai Health System is an integrated health system committed to providing distinguished care, conducting transformative research, and advancing biomedical education. Structured around seven hospital campuses and a single medical school, the Health System has an extensive ambulatory netwo

Dr. Sulaiman Al Habib Medical Group

Leading Private Healthcare Provider in the Middle East With a vision to be the most trusted healthcare provider in medical excellence and patient experience globally, Dr. Sulaiman Al-Habib Medical Group (HMG) has become the largest provider of comprehensive healthcare services in the Middle East. A

Molina Healthcare

Molina Healthcare is a FORTUNE 500 company that is focused exclusively on government-sponsored health care programs for families and individuals who qualify for government sponsored health care. Molina Healthcare contracts with state governments and serves as a health plan providing a wide range o

GE HealthCare

Every day millions of people feel the impact of our intelligent devices, advanced analytics and artificial intelligence. As a leading global medical technology and digital solutions innovator, GE HealthCare enables clinicians to make faster, more informed decisions through intelligent devices, data

newsone

RDH CyberSecurity News

October 30, 2020 07:00 AM
Small players along critical infrastructure at mercy of ransomware

Between data exfiltration and frozen operations, ransomware is compromising the weakest elements of critical infrastructure.

August 10, 2020 07:00 AM
After a small Colorado city paid cyber attackers a ransom, there’s concern about the rest of the state

If Debbie Wilmot could turn back time, the city of Lafayette would have scanned its computer network regularly. It would have hunted down...

June 29, 2020 07:00 AM
UCSF pays $1.14 million to decrypt files after ransomware attack

The medical school was hit by an opportunistic malware attack on June 1, and the encrypted data was "important to some of the academic work...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

RDH CyberSecurity History Information

Official Website of Rangely District Hospital

The official website of Rangely District Hospital is http://www.rangelyhospital.org.

Rangely District Hospital’s AI-Generated Cybersecurity Score

According to Rankiteo, Rangely District Hospital’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Rangely District Hospital’ have ?

According to Rankiteo, Rangely District Hospital currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Rangely District Hospital have SOC 2 Type 1 certification ?

According to Rankiteo, Rangely District Hospital is not certified under SOC 2 Type 1.

Does Rangely District Hospital have SOC 2 Type 2 certification ?

According to Rankiteo, Rangely District Hospital does not hold a SOC 2 Type 2 certification.

Does Rangely District Hospital comply with GDPR ?

According to Rankiteo, Rangely District Hospital is not listed as GDPR compliant.

Does Rangely District Hospital have PCI DSS certification ?

According to Rankiteo, Rangely District Hospital does not currently maintain PCI DSS compliance.

Does Rangely District Hospital comply with HIPAA ?

According to Rankiteo, Rangely District Hospital is not compliant with HIPAA regulations.

Does Rangely District Hospital have ISO 27001 certification ?

According to Rankiteo,Rangely District Hospital is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Rangely District Hospital

Rangely District Hospital operates primarily in the Hospitals and Health Care industry.

Number of Employees at Rangely District Hospital

Rangely District Hospital employs approximately 66 people worldwide.

Subsidiaries Owned by Rangely District Hospital

Rangely District Hospital presently has no subsidiaries across any sectors.

Rangely District Hospital’s LinkedIn Followers

Rangely District Hospital’s official LinkedIn profile has approximately 238 followers.

NAICS Classification of Rangely District Hospital

Rangely District Hospital is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Rangely District Hospital’s Presence on Crunchbase

No, Rangely District Hospital does not have a profile on Crunchbase.

Rangely District Hospital’s Presence on LinkedIn

Yes, Rangely District Hospital maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rangely-district-hospital.

Cybersecurity Incidents Involving Rangely District Hospital

As of December 15, 2025, Rankiteo reports that Rangely District Hospital has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Rangely District Hospital has an estimated 31,246 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Rangely District Hospital ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Ransomware Attack on Rangely District Hospital

Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospital’s computer network were attacked by ransomware, including some files containing patients’ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.

Date Detected: April 2020

Type: Ransomware

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware RAN2105123

Data Compromised: Names, Dates of birth, Social security numbers, Addresses, Telephone numbers, Driver’s license copies, Dates of service or hospital admissions, Diagnoses and conditions, Treatment or procedure notes and orders, Imaging studies, Medications, Health insurance and claims and billing information

Systems Affected: hospital’s computer networksoftware to access database records

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Social Security Numbers, Addresses, Telephone Numbers, Driver’S License Copies, Dates Of Service Or Hospital Admissions, Diagnoses And Conditions, Treatment Or Procedure Notes And Orders, Imaging Studies, Medications, Health Insurance And Claims And Billing Information and .

Which entities were affected by each incident ?

Incident : Ransomware RAN2105123

Entity Name: Rangely District Hospital

Entity Type: Healthcare

Industry: Healthcare

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware RAN2105123

Type of Data Compromised: Names, Dates of birth, Social security numbers, Addresses, Telephone numbers, Driver’s license copies, Dates of service or hospital admissions, Diagnoses and conditions, Treatment or procedure notes and orders, Imaging studies, Medications, Health insurance and claims and billing information

Sensitivity of Data: High

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware RAN2105123

Data Encryption: True

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on April 2020.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, health insurance and claims and billing information and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was hospital’s computer networksoftware to access database records.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were social security numbers, imaging studies, dates of service or hospital admissions, names, diagnoses and conditions, medications, dates of birth, health insurance and claims and billing information, addresses, telephone numbers, treatment or procedure notes and orders and driver’s license copies.

cve

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=rangely-district-hospital' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge