Comparison Overview

San Andreas Regional Center

VS

UNICEF

San Andreas Regional Center

6203 San Ignacio Ave, None, San Jose, California, US, 95119
Last Update: 2025-12-19

Who We Are San Andreas Regional Center is a community-based, private nonprofit corporation funded by the State of California to serve people with developmental disabilities as required by the Lanterman Developmental Disabilities Act. The Lanterman Act is part of California law that sets out the rights and responsibilities of persons with developmental disabilities. San Andreas is one of 21 regional centers throughout California serving individuals and their families who reside within Monterey, San Benito, Santa Clara, and Santa Cruz Counties. Services Provided Once an individual’s eligibility has been determined through the Intake process, service coordination and planning is initiated with the development of a person centered written plan. Services are individually determined and are provided to assist with opportunities to maximize consumers’ opportunities to live independent productive and satisfying lives as members of our community. Mission Statement San Andreas Regional Center Mission Statement recognizes the ongoing need for advocacy to sustain the original intent and promise of the Lanterman Developmental Disabilities Act and commits itself to protecting its provisions. Equal Opportunity Employer San Andreas Regional Center is an Equal Opportunity Employer. This agency does not and will not discriminate in employment and personnel practices on the basis of race, sex, age, handicap, religion, national origin or any other basis prohibited by applicable law. Hiring, transferring and promotion practices are performed without regard to the above listed items. Apply online: https://www.sanandreasregional.org/careers/​ or check out the Jobs tab at the top of this page.

NAICS: 8135
NAICS Definition: Others
Employees: 324
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

UNICEF

3 United Nations Plaza, New York, New York, US, 10017
Last Update: 2025-12-17
Between 800 and 849

UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories, we work for every child, everywhere, every day, to build a better world for everyone. And we never give up.

NAICS: 8135
NAICS Definition: Others
Employees: 44,786
Subsidiaries: 28
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/san-andreas-regional-center.jpeg
San Andreas Regional Center
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/unicef.jpeg
UNICEF
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
San Andreas Regional Center
100%
Compliance Rate
0/4 Standards Verified
UNICEF
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for San Andreas Regional Center in 2025.

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for UNICEF in 2025.

Incident History — San Andreas Regional Center (X = Date, Y = Severity)

San Andreas Regional Center cyber incidents detection timeline including parent company and subsidiaries

Incident History — UNICEF (X = Date, Y = Severity)

UNICEF cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/san-andreas-regional-center.jpeg
San Andreas Regional Center
Incidents

Date Detected: 7/2021
Type:Ransomware
Attack Vector: Ransomware
Blog: Blog
https://images.rankiteo.com/companyimages/unicef.jpeg
UNICEF
Incidents

Date Detected: 09/2019
Type:Data Leak
Attack Vector: Misconfigured Email
Blog: Blog

FAQ

UNICEF company demonstrates a stronger AI Cybersecurity Score compared to San Andreas Regional Center company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

San Andreas Regional Center and UNICEF have experienced a similar number of publicly disclosed cyber incidents.

In the current year, UNICEF company and San Andreas Regional Center company have not reported any cyber incidents.

San Andreas Regional Center company has confirmed experiencing a ransomware attack, while UNICEF company has not reported such incidents publicly.

Neither UNICEF company nor San Andreas Regional Center company has reported experiencing a data breach publicly.

Neither UNICEF company nor San Andreas Regional Center company has reported experiencing targeted cyberattacks publicly.

Neither San Andreas Regional Center company nor UNICEF company has reported experiencing or disclosing vulnerabilities publicly.

Neither San Andreas Regional Center nor UNICEF holds any compliance certifications.

Neither company holds any compliance certifications.

UNICEF company has more subsidiaries worldwide compared to San Andreas Regional Center company.

UNICEF company employs more people globally than San Andreas Regional Center company, reflecting its scale as a Non-profit Organizations.

Neither San Andreas Regional Center nor UNICEF holds SOC 2 Type 1 certification.

Neither San Andreas Regional Center nor UNICEF holds SOC 2 Type 2 certification.

Neither San Andreas Regional Center nor UNICEF holds ISO 27001 certification.

Neither San Andreas Regional Center nor UNICEF holds PCI DSS certification.

Neither San Andreas Regional Center nor UNICEF holds HIPAA certification.

Neither San Andreas Regional Center nor UNICEF holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X