Company Details
sebastian-county-government
111
164
5415
sebastiancountyonline.com
0
SEB_2905812
In-progress

Sebastian County Government Company CyberSecurity Posture
sebastiancountyonline.comList of county services/departments
Company Details
sebastian-county-government
111
164
5415
sebastiancountyonline.com
0
SEB_2905812
In-progress
Between 700 and 749

SCG Global Score (TPRM)XXXX

Description: Sebastian County suffered an email security data breach in March 2017. Approximately 200 employees' banking account information and routing codes were linked in an email sent by a payroll administrator to a group of county workers. They took preventive steps to stop this type of incident in the future.


No incidents recorded for Sebastian County Government in 2025.
No incidents recorded for Sebastian County Government in 2025.
No incidents recorded for Sebastian County Government in 2025.
SCG cyber incidents detection timeline including parent company and subsidiaries

List of county services/departments


Infinite is a global leader in technology modernization, next-gen IT services and solutions, and digital engineering, with over two decades of experience helping clients turn digital transformation into business value. Leveraging an AI-first approach, we combine leading technologies, innovative plat

Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 5

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie

In a rapidly changing world, technology is everything. It's in the fabric of society. In every part of every business. At the very heart of human evolution. It’s a great power that comes with great responsibility. At Tietoevry, we believe it’s time to shift perspective. It’s not about what technolo
Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation s

Infosys BPM Ltd., the business process management subsidiary of Infosys Ltd. (NYSE: INFY), was set up in April 2002. Infosys BPM focuses on integrated end-to-end outsourcing and delivers transformational benefits to its clients through reduced costs, ongoing productivity improvements, and process re

Virtusa is a global product and platform engineering services company that makes experiences better with technology. We help organizations grow faster, more profitably, and more sustainably by reimagining enterprises through domain-driven solutions. We combine strategy, design, and engineering, back
.png)
Austria's youngest ever leader Kurz tells Candice Krieger about his role in Israeli unicorn Dream Security, which protects governments from...
Cybersecurity firm Dream, a partnership between former NSO Group CEO Shalev Hulio and former Austrian leader Sebastian Kurz, becomes a unicorn and is hoping to...
The Israeli entrepreneur Shalev Hulio gained notoriety for designing Pegasus, the now-infamous spyware that has been used by governments to hack journalists...
This case study examines Sweden's efforts to strengthen election protection over the last eight years, focusing on Sweden's collaborative approach to...
Dream, the world's first AI company for government and national infrastructure cybersecurity, raises $100 million at a valuation of $1.1 billion, led by Bain...
Dream, an AI-based company providing cyber resilience for nations and critical infrastructure, announced a $100 million Series B led by Bain Capital Ventures.
Dream, an artificial intelligence company that provides cybersecurity services to governments and critical infrastructure operators such as hospitals and...
Dream, an AI company providing cyber resilience for nations and critical infrastructure, today announced a $100 million Series B led by Bain Capital Ventures.
Dream, a company focused on artificial intelligence (AI)-powered cybersecurity for nations and critical infrastructure, raised $100 million in a Series B...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Sebastian County Government is http://www.sebastiancountyonline.com.
According to Rankiteo, Sebastian County Government’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.
According to Rankiteo, Sebastian County Government currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Sebastian County Government is not certified under SOC 2 Type 1.
According to Rankiteo, Sebastian County Government does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Sebastian County Government is not listed as GDPR compliant.
According to Rankiteo, Sebastian County Government does not currently maintain PCI DSS compliance.
According to Rankiteo, Sebastian County Government is not compliant with HIPAA regulations.
According to Rankiteo,Sebastian County Government is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Sebastian County Government operates primarily in the IT Services and IT Consulting industry.
Sebastian County Government employs approximately 111 people worldwide.
Sebastian County Government presently has no subsidiaries across any sectors.
Sebastian County Government’s official LinkedIn profile has approximately 164 followers.
Sebastian County Government is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Sebastian County Government does not have a profile on Crunchbase.
Yes, Sebastian County Government maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sebastian-county-government.
As of December 10, 2025, Rankiteo reports that Sebastian County Government has experienced 1 cybersecurity incidents.
Sebastian County Government has an estimated 37,462 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with preventive steps to stop this type of incident in the future..
Title: Sebastian County Email Security Data Breach
Description: Sebastian County suffered an email security data breach in March 2017. Approximately 200 employees' banking account information and routing codes were linked in an email sent by a payroll administrator to a group of county workers. They took preventive steps to stop this type of incident in the future.
Date Detected: March 2017
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Banking account information, Routing codes
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Banking Account Information, Routing Codes and .

Entity Name: Sebastian County
Entity Type: Government
Industry: Public Administration
Location: Sebastian County, Arkansas, USA

Remediation Measures: Preventive steps to stop this type of incident in the future

Type of Data Compromised: Banking account information, Routing codes
Number of Records Exposed: 200
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Preventive steps to stop this type of incident in the future, .

Root Causes: Human Error,
Corrective Actions: Preventive Steps To Stop This Type Of Incident In The Future,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Preventive Steps To Stop This Type Of Incident In The Future, .
Most Recent Incident Detected: The most recent incident detected was on March 2017.
Most Significant Data Compromised: The most significant data compromised in an incident were Banking account information, Routing codes and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Routing codes and Banking account information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 200.0.
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.