Company Details
rchealthservices
111
571
None
rchealthservices.com
0
RC _3053105
In-progress

RC Health Services Company CyberSecurity Posture
rchealthservices.comRC Health Services is the premiere American Heart Association Training Center and EMS Academy in the USA. We offer CPR, BLS, ACLS, PALS, initial EMR, EMT, and AEMT courses, as well as CE solutions for all healthcare providers.
Company Details
rchealthservices
111
571
None
rchealthservices.com
0
RC _3053105
In-progress
Between 700 and 749

RHS Global Score (TPRM)XXXX

Description: R-C Healthcare was affected by a third-party breach in October 2016. Data leaked by an error made in resetting network settings that exposed 655,000 of its patients’ records. They notified their patients about the incident and started investigating the incident.


No incidents recorded for RC Health Services in 2025.
No incidents recorded for RC Health Services in 2025.
No incidents recorded for RC Health Services in 2025.
RHS cyber incidents detection timeline including parent company and subsidiaries

RC Health Services is the premiere American Heart Association Training Center and EMS Academy in the USA. We offer CPR, BLS, ACLS, PALS, initial EMR, EMT, and AEMT courses, as well as CE solutions for all healthcare providers.


For 52 years, the Department of Education of Pernambuco was linked to the health department of the State. The disconnect between the two bodies and the consequent acquisition of autonomy of the SE came through Law 466, on 22 April 1949, during the administration of then Governor Alexandre José Barbo
.png)
Pinarayi stressed the need for electronic governance systems to prepare for growing cyber threats as public services become increasingly...
A defective update from U.S. cybersecurity software company CrowdStrike crashed Microsoft Windows systems around the globe Friday.
Change Healthcare published articles extolling the need for cybersecurity measures even though it lacked standard safeguards.
Following the HHS's 2023 concept paper outlining strategies to enhance cybersecurity for the health care and public health sectors, the HHS released its...
Ransomware is the most significant cyber threat facing society today. However, much is still unknown about its impact on our economy, society and citizens.
An Alabama baby was born with severe brain injury and eventually died due to botched care because her hospital was struggling with a...
Australian Cyber Security Centre report reveals ransomware incidents up 15% as cybercrime losses hit $33bn.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of RC Health Services is http://www.rchealthservices.com.
According to Rankiteo, RC Health Services’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.
According to Rankiteo, RC Health Services currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, RC Health Services is not certified under SOC 2 Type 1.
According to Rankiteo, RC Health Services does not hold a SOC 2 Type 2 certification.
According to Rankiteo, RC Health Services is not listed as GDPR compliant.
According to Rankiteo, RC Health Services does not currently maintain PCI DSS compliance.
According to Rankiteo, RC Health Services is not compliant with HIPAA regulations.
According to Rankiteo,RC Health Services is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
RC Health Services operates primarily in the Education Management industry.
RC Health Services employs approximately 111 people worldwide.
RC Health Services presently has no subsidiaries across any sectors.
RC Health Services’s official LinkedIn profile has approximately 571 followers.
RC Health Services is classified under the NAICS code None, which corresponds to Others.
No, RC Health Services does not have a profile on Crunchbase.
Yes, RC Health Services maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rchealthservices.
As of December 07, 2025, Rankiteo reports that RC Health Services has experienced 1 cybersecurity incidents.
RC Health Services has an estimated 4,513 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notified patients..
Title: R-C Healthcare Third-Party Data Breach
Description: R-C Healthcare was affected by a third-party breach in October 2016. Data leaked by an error made in resetting network settings that exposed 655,000 of its patients’ records. They notified their patients about the incident and started investigating the incident.
Date Detected: October 2016
Type: Data Breach
Attack Vector: Misconfiguration
Vulnerability Exploited: Error in resetting network settings
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Patient records
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Records and .

Entity Name: R-C Healthcare
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 655000

Communication Strategy: Notified Patients

Type of Data Compromised: Patient records
Number of Records Exposed: 655000

Source: Incident Description
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Incident Description.

Investigation Status: Started investigating the incident
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified Patients.
Most Recent Incident Detected: The most recent incident detected was on October 2016.
Most Significant Data Compromised: The most significant data compromised in an incident were Patient Records and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Patient Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 655.0.
Most Recent Source: The most recent source of information about an incident is Incident Description.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Started investigating the incident.
.png)
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM Otherwise accessing them can cause a crash.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices Previously, APU platforms (and other scenarios with uninitialized VRAM managers) triggered a NULL pointer dereference in `ttm_resource_manager_usage()`. The root cause is not that the `struct ttm_resource_manager *man` pointer itself is NULL, but that `man->bdev` (the backing device pointer within the manager) remains uninitialized (NULL) on APUs—since APUs lack dedicated VRAM and do not fully set up VRAM manager structures. When `ttm_resource_manager_usage()` attempts to acquire `man->bdev->lru_lock`, it dereferences the NULL `man->bdev`, leading to a kernel OOPS. 1. **amdgpu_cs.c**: Extend the existing bandwidth control check in `amdgpu_cs_get_threshold_for_moves()` to include a check for `ttm_resource_manager_used()`. If the manager is not used (uninitialized `bdev`), return 0 for migration thresholds immediately—skipping VRAM-specific logic that would trigger the NULL dereference. 2. **amdgpu_kms.c**: Update the `AMDGPU_INFO_VRAM_USAGE` ioctl and memory info reporting to use a conditional: if the manager is used, return the real VRAM usage; otherwise, return 0. This avoids accessing `man->bdev` when it is NULL. 3. **amdgpu_virt.c**: Modify the vf2pf (virtual function to physical function) data write path. Use `ttm_resource_manager_used()` to check validity: if the manager is usable, calculate `fb_usage` from VRAM usage; otherwise, set `fb_usage` to 0 (APUs have no discrete framebuffer to report). This approach is more robust than APU-specific checks because it: - Works for all scenarios where the VRAM manager is uninitialized (not just APUs), - Aligns with TTM's design by using its native helper function, - Preserves correct behavior for discrete GPUs (which have fully initialized `man->bdev` and pass the `ttm_resource_manager_used()` check). v4: use ttm_resource_manager_used(&adev->mman.vram_mgr.manager) instead of checking the adev->gmc.is_app_apu flag (Christian)
In the Linux kernel, the following vulnerability has been resolved: exfat: fix improper check of dentry.stream.valid_size We found an infinite loop bug in the exFAT file system that can lead to a Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is malformed, the following system calls — SYS_openat, SYS_ftruncate, and SYS_pwrite64 — can cause the kernel to hang. Root cause analysis shows that the size validation code in exfat_find() does not check whether dentry.stream.valid_size is negative. As a result, the system calls mentioned above can succeed and eventually trigger the DoS issue. This patch adds a check for negative dentry.stream.valid_size to prevent this vulnerability.
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix possible memory leak in smb2_read() Memory leak occurs when ksmbd_vfs_read() fails. Fix this by adding the missing kvfree().
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix possible refcount leak in smb2_sess_setup() Reference count of ksmbd_session will leak when session need reconnect. Fix this by adding the missing ksmbd_user_session_put().

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.