Company Details
sccublichealth
261
3,408
923
sccphd.org
0
COU_8525667
In-progress

County of Santa Clara Public Health Department Company CyberSecurity Posture
sccphd.orgThe County of Santa Clara Public Health Department focuses on protecting and improving the health of communities through education, promotion of healthy lifestyles, disease and injury prevention, and the promotion of sound health policy. The Department is comprised of a highly diverse work force that encompasses many professional disciplines and several main areas of focus. The Department includes over 30 programs and services organized across seven divisions and centers. Email: [email protected] Fax: (408) 792-5041 Hearing Impaired Contact: 7-1-1 (California Relay Service)
Company Details
sccublichealth
261
3,408
923
sccphd.org
0
COU_8525667
In-progress
Between 750 and 799

CSCPHD Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving Santa Clara Valley Medical Center on September 27, 2013. The breach was discovered on September 16, 2013, after a laptop containing patient information was stolen on September 14 or 15, 2013, affecting an unknown number of patients with disclosed information including patient names, medical record numbers, dates of birth, and other sensitive data.


No incidents recorded for County of Santa Clara Public Health Department in 2025.
No incidents recorded for County of Santa Clara Public Health Department in 2025.
No incidents recorded for County of Santa Clara Public Health Department in 2025.
CSCPHD cyber incidents detection timeline including parent company and subsidiaries

The County of Santa Clara Public Health Department focuses on protecting and improving the health of communities through education, promotion of healthy lifestyles, disease and injury prevention, and the promotion of sound health policy. The Department is comprised of a highly diverse work force that encompasses many professional disciplines and several main areas of focus. The Department includes over 30 programs and services organized across seven divisions and centers. Email: [email protected] Fax: (408) 792-5041 Hearing Impaired Contact: 7-1-1 (California Relay Service)


Every young Queenslander deserves a strong education and a fulfilling future. The Queensland Department of Education is committed to realising the potential of every student through the power of quality education, support and teamwork. With a workforce of over 95,000 people across regional, remote,

Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

Welcome! We're the National Oceanic & Atmospheric Administration or NOAA. From daily weather forecasts, severe storm warnings and climate monitoring to fisheries management, coastal restoration and supporting marine commerce, our products and services support economic vitality and affect more than

Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state. We are a team of dedicated public servants committed to high performance, innovative thinking, and delivering excellent and efficien

Workingfor.be is the job platform of the federal administration. Here, you will find a wide variety of jobs in different fields of profession. Every day thousands of our employees help build tomorrow's society. When you choose the federal administration, you choose an employer who embraces you

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you
.png)
October is National Cybersecurity Awareness Month, and a great reminder for everyone to participate in growing security awareness!
If you are interested in hosting a special event in Palo Alto, learn more from the Police Department about the processes required to obtain...
Winners from across the country are setting the standard for people-first services, blending technology with creativity to build trust with...
Federal Reserve cuts interest rates by quarter-point to 4-4.25%. Aster Jewelers in Oakland robbed of $100000 in jewelry.
Netskope is seeking a valuation of up to US$6.5 billion in its initial public offering in the United States, the cloud-based cybersecurity...
COVID is once again climbing to troubling levels in California — a worrying trend as health officials attempt to navigate a vaccine...
COVID is on the rise again. The uptick was first registered in Northern California, but has also started being seen in Southern California...
Role models for students, parents, educators, and the cybersecurity community Sponsored by Secureworks.
This Review addresses (1) the regulation of privacy and data security, other legislative developments, enforcement actions by federal and state authorities,

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of County of Santa Clara Public Health Department is https://www.sccphd.org.
According to Rankiteo, County of Santa Clara Public Health Department’s AI-generated cybersecurity score is 763, reflecting their Fair security posture.
According to Rankiteo, County of Santa Clara Public Health Department currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, County of Santa Clara Public Health Department is not certified under SOC 2 Type 1.
According to Rankiteo, County of Santa Clara Public Health Department does not hold a SOC 2 Type 2 certification.
According to Rankiteo, County of Santa Clara Public Health Department is not listed as GDPR compliant.
According to Rankiteo, County of Santa Clara Public Health Department does not currently maintain PCI DSS compliance.
According to Rankiteo, County of Santa Clara Public Health Department is not compliant with HIPAA regulations.
According to Rankiteo,County of Santa Clara Public Health Department is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
County of Santa Clara Public Health Department operates primarily in the Public Health industry.
County of Santa Clara Public Health Department employs approximately 261 people worldwide.
County of Santa Clara Public Health Department presently has no subsidiaries across any sectors.
County of Santa Clara Public Health Department’s official LinkedIn profile has approximately 3,408 followers.
No, County of Santa Clara Public Health Department does not have a profile on Crunchbase.
Yes, County of Santa Clara Public Health Department maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sccublichealth.
As of November 28, 2025, Rankiteo reports that County of Santa Clara Public Health Department has experienced 1 cybersecurity incidents.
County of Santa Clara Public Health Department has an estimated 280 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Santa Clara Valley Medical Center
Description: A laptop containing patient information was stolen, affecting an unknown number of patients with disclosed information including patient names, medical record numbers, dates of birth, and other sensitive data.
Date Detected: 2013-09-16
Date Publicly Disclosed: 2013-09-27
Type: Data Breach
Attack Vector: Theft of Laptop
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Patient names, Medical record numbers, Dates of birth, Other sensitive data
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Names, Medical Record Numbers, Dates Of Birth, Other Sensitive Data and .

Entity Name: Santa Clara Valley Medical Center
Entity Type: Healthcare
Industry: Healthcare
Location: California, USA
Customers Affected: Unknown number of patients

Type of Data Compromised: Patient names, Medical record numbers, Dates of birth, Other sensitive data
Sensitivity of Data: High

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.
Most Recent Incident Detected: The most recent incident detected was on 2013-09-16.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2013-09-27.
Most Significant Data Compromised: The most significant data compromised in an incident were patient names, medical record numbers, dates of birth, other sensitive data and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were patient names, dates of birth, medical record numbers and other sensitive data.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.