Comparison Overview

San Andreas Regional Center

VS

IEEE

San Andreas Regional Center

6203 San Ignacio Ave, None, San Jose, California, US, 95119
Last Update: 2025-12-19

Who We Are San Andreas Regional Center is a community-based, private nonprofit corporation funded by the State of California to serve people with developmental disabilities as required by the Lanterman Developmental Disabilities Act. The Lanterman Act is part of California law that sets out the rights and responsibilities of persons with developmental disabilities. San Andreas is one of 21 regional centers throughout California serving individuals and their families who reside within Monterey, San Benito, Santa Clara, and Santa Cruz Counties. Services Provided Once an individual’s eligibility has been determined through the Intake process, service coordination and planning is initiated with the development of a person centered written plan. Services are individually determined and are provided to assist with opportunities to maximize consumers’ opportunities to live independent productive and satisfying lives as members of our community. Mission Statement San Andreas Regional Center Mission Statement recognizes the ongoing need for advocacy to sustain the original intent and promise of the Lanterman Developmental Disabilities Act and commits itself to protecting its provisions. Equal Opportunity Employer San Andreas Regional Center is an Equal Opportunity Employer. This agency does not and will not discriminate in employment and personnel practices on the basis of race, sex, age, handicap, religion, national origin or any other basis prohibited by applicable law. Hiring, transferring and promotion practices are performed without regard to the above listed items. Apply online: https://www.sanandreasregional.org/careers/​ or check out the Jobs tab at the top of this page.

NAICS: 8135
NAICS Definition: Others
Employees: 324
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

IEEE

455 Hoes Lane, Piscataway, NJ, US, 08854
Last Update: 2025-12-17
Between 750 and 799

IEEE is the world’s largest technical professional organization and is a public charity dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is the trusted “voice” for engineering, computing and technology information around the globe. For information about the IEEE - visit http://www.ieee.org.

NAICS: 8135
NAICS Definition: Others
Employees: 14,099
Subsidiaries: 15
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/san-andreas-regional-center.jpeg
San Andreas Regional Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/ieee.jpeg
IEEE
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
San Andreas Regional Center
100%
Compliance Rate
0/4 Standards Verified
IEEE
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for San Andreas Regional Center in 2025.

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for IEEE in 2025.

Incident History — San Andreas Regional Center (X = Date, Y = Severity)

San Andreas Regional Center cyber incidents detection timeline including parent company and subsidiaries

Incident History — IEEE (X = Date, Y = Severity)

IEEE cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/san-andreas-regional-center.jpeg
San Andreas Regional Center
Incidents

Date Detected: 7/2021
Type:Ransomware
Attack Vector: Ransomware
Blog: Blog
https://images.rankiteo.com/companyimages/ieee.jpeg
IEEE
Incidents

No Incident

FAQ

IEEE company demonstrates a stronger AI Cybersecurity Score compared to San Andreas Regional Center company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

San Andreas Regional Center company has historically faced a number of disclosed cyber incidents, whereas IEEE company has not reported any.

In the current year, IEEE company and San Andreas Regional Center company have not reported any cyber incidents.

San Andreas Regional Center company has confirmed experiencing a ransomware attack, while IEEE company has not reported such incidents publicly.

Neither IEEE company nor San Andreas Regional Center company has reported experiencing a data breach publicly.

Neither IEEE company nor San Andreas Regional Center company has reported experiencing targeted cyberattacks publicly.

Neither San Andreas Regional Center company nor IEEE company has reported experiencing or disclosing vulnerabilities publicly.

Neither San Andreas Regional Center nor IEEE holds any compliance certifications.

Neither company holds any compliance certifications.

IEEE company has more subsidiaries worldwide compared to San Andreas Regional Center company.

IEEE company employs more people globally than San Andreas Regional Center company, reflecting its scale as a Non-profit Organizations.

Neither San Andreas Regional Center nor IEEE holds SOC 2 Type 1 certification.

Neither San Andreas Regional Center nor IEEE holds SOC 2 Type 2 certification.

Neither San Andreas Regional Center nor IEEE holds ISO 27001 certification.

Neither San Andreas Regional Center nor IEEE holds PCI DSS certification.

Neither San Andreas Regional Center nor IEEE holds HIPAA certification.

Neither San Andreas Regional Center nor IEEE holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X