Company Details
soundhealthwa
843
4,135
62133
sound.health
0
SOU_1816642
In-progress


Sound Company CyberSecurity Posture
sound.health[For job openings at Sound, please visit : https://careers-sound.icims.com/jobs/intro?hashed=-625949297 Sound is one of King County's most comprehensive providers of mental health and addiction services. With award-winning and innovative programs, we enable people in the community to live more fulfilled and productive lives and we promote a safer community for everyone. We are the first behavioral health agency to adopt the Reaching Recovery model, an evidence-based clinical model that promotes high levels of client engagement, improves outcomes and enables providers to better measure a client’s recovery. To learn more about our history, services and impact on community health, visit www.sound.health
Company Details
soundhealthwa
843
4,135
62133
sound.health
0
SOU_1816642
In-progress
Between 750 and 799

Sound Global Score (TPRM)XXXX



No incidents recorded for Sound in 2026.
No incidents recorded for Sound in 2026.
No incidents recorded for Sound in 2026.
Sound cyber incidents detection timeline including parent company and subsidiaries

[For job openings at Sound, please visit : https://careers-sound.icims.com/jobs/intro?hashed=-625949297 Sound is one of King County's most comprehensive providers of mental health and addiction services. With award-winning and innovative programs, we enable people in the community to live more fulfilled and productive lives and we promote a safer community for everyone. We are the first behavioral health agency to adopt the Reaching Recovery model, an evidence-based clinical model that promotes high levels of client engagement, improves outcomes and enables providers to better measure a client’s recovery. To learn more about our history, services and impact on community health, visit www.sound.health


L‘Associazione A.P.I.C.E. (Associazione di Psicologia per l’Intervento sulla Comunicazione e le Emozioni) nasce con l’intento di sensibilizzare e promuovere inziative di supporto psicologico. Il concetto di APICE si riferisce al concetto di traguardo, di "vetta" da raggiungere per migliorare il b

Baker’s Home started with Estelle Baker and the vision she had to keep aging people off the streets and help and the community as much as she could. Baker's Home was first located at 230 Bracy Street when Estelle was the only one there to take care of the few residents she had. As the years went

TheraMind Services offers TMS therapy for drug resistant depression (Transcranial Magnetic Stimulation). TMS is a noninvasive, non-drug, side effect free, procedure that uses magnetic fields to stimulate nerve cells in the brain to improve symptoms of depression. Through a treatment coil, the TMS th

National Council for Mental Wellbeing is the unifying voice of America’s community mental health and addictions treatment organizations. Together with more than 3,300 member organizations, we serve more than 10 million adults and children living with mental illnesses and addictions. The organization

Life Balance Recovery is here to help support and change the lives of those affected by Substance use and Mental health disorders. Substance abuse and Mental health have some very serious negative impacts and our team is here to help you gain the knowledge and skills needed to live a fulfilling abun

At Families First of Florida, we help children, adults and their families with emotional and mental health needs. With empathy and compassion, we utilize best-practice trauma informed psychiatric and therapeutic interventions to assist clients and their families with the tools and treatment to heal,

Prevail Health is a leader in technology-based behavioral health and resilience building for a wide range of challenges from depression to PTSD to substance abuse. Prevail’s technology platform provides online care tailored to each individual’s unique clinical and demographic needs. Two clinical tri
NAMI (National Alliance on Mental Illness) Fox Valley works to support and empower everyone touched by mental illness. We envision a stigma-free community, and society, that supports and promotes mental health and recovery. Serving Calumet, Outagamie, Waupaca and northern Winnebago counties, NAMI F

Unison Health is a nonprofit organization with over 50 years of experience providing compassionate, comprehensive behavioral health care and substance use treatment services to individuals of all ages. We are committed to making mental health and addiction services accessible, affordable, and stigma
.png)
U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity - driven by remote access, third-party vendors...
A minority-owned cybersecurity company is suing Kansas City, Missouri-based Burns & McDonnell over a $60 million contract with Seattle City...
Transnational cybersecurity agencies expanded on a May joint cybersecurity advisory warning about pro-Russia hacktivists targeting U.S. and...
In a sweeping escalation of global cybersecurity tensions, both Google and Apple have issued high-confidence alerts to users across multiple...
Low-cost remote management device shipped with an active audio recording pipeline.
Apple and Google sound global alarm as state-linked cyber attacks target users in 150 countries · Apple and Google have warned users in over 150...
Cbus said that its “cyber incident” occurred days after other major super funds – including AustralianSuper, Rest, Australian Retirement Trust, and Insignia –...
A new critical vulnerability has been discovered within WhatsApp that has exposed the phone numbers of over 3.5 billion account holders,...
Chainguard, based in Kirkland, secures $280M funding, raising its total to $892M since 2021. The cybersecurity startup plans to expand its...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Sound is http://www.sound.health.
According to Rankiteo, Sound’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, Sound currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Sound has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Sound is not certified under SOC 2 Type 1.
According to Rankiteo, Sound does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Sound is not listed as GDPR compliant.
According to Rankiteo, Sound does not currently maintain PCI DSS compliance.
According to Rankiteo, Sound is not compliant with HIPAA regulations.
According to Rankiteo,Sound is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Sound operates primarily in the Mental Health Care industry.
Sound employs approximately 843 people worldwide.
Sound presently has no subsidiaries across any sectors.
Sound’s official LinkedIn profile has approximately 4,135 followers.
Sound is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
Yes, Sound has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/sound-5009.
Yes, Sound maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/soundhealthwa.
As of January 23, 2026, Rankiteo reports that Sound has not experienced any cybersecurity incidents.
Sound has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Sound has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.