Comparison Overview

Spark of Creation Therapy

VS

DBT Institute of Michigan

Spark of Creation Therapy

1740 Ridge Road, Evanston, IL, 60201, US
Last Update: 2026-01-22
Between 750 and 799

Spark of Creation Therapy is a consortium of psychotherapists located in Evanston, IL. We provide a "get-it-done" attitude to therapy and work with individuals with a range of symptoms and goals. SPARK clinicians are dedicated to providing emotional support, and when necessary, challenging their patients to move beyond the habits that keep them stuck. In this way, people have the opportunity to experiment with new ways of being and relating to others. Therapy becomes not just a “chat about the news” but a process. It is the process that empowers people to change. People can make the changes they have wanted to make without the pain and difficulty they may have experienced in the past. Our philosophy is quite simple yet sophisticated. Our experienced therapists do whatever it takes to get you or your loved ones feeling better.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

DBT Institute of Michigan

2950 W Howell Rd, Mason, Michigan, 48854, US
Last Update: 2026-01-23
Between 750 and 799

The DBT Institute of Michigan is a full-service counseling center. We pride ourselves on providing comprehensive DBT treatment to adults and adolescents who are suffering from Borderline Personality Disorder (BPD) and suicidal behaviors. We also provide cognitive-behavior therapy for a wide range of mental health disorders. Our mission is to provide the most competent and effective Dialectical Behavior Therapy treatment to individuals. We strive to "raise the bar" with regard to standards of evidence-based treatment and best practice.

NAICS: 621
NAICS Definition:
Employees: 29
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/spark-of-creation-therapy.jpeg
Spark of Creation Therapy
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/dbt-institute-of-michigan.jpeg
DBT Institute of Michigan
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Spark of Creation Therapy
100%
Compliance Rate
0/4 Standards Verified
DBT Institute of Michigan
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Spark of Creation Therapy in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for DBT Institute of Michigan in 2026.

Incident History — Spark of Creation Therapy (X = Date, Y = Severity)

Spark of Creation Therapy cyber incidents detection timeline including parent company and subsidiaries

Incident History — DBT Institute of Michigan (X = Date, Y = Severity)

DBT Institute of Michigan cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/spark-of-creation-therapy.jpeg
Spark of Creation Therapy
Incidents

No Incident

https://images.rankiteo.com/companyimages/dbt-institute-of-michigan.jpeg
DBT Institute of Michigan
Incidents

No Incident

FAQ

Spark of Creation Therapy company demonstrates a stronger AI Cybersecurity Score compared to DBT Institute of Michigan company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, DBT Institute of Michigan company has disclosed a higher number of cyber incidents compared to Spark of Creation Therapy company.

In the current year, DBT Institute of Michigan company and Spark of Creation Therapy company have not reported any cyber incidents.

Neither DBT Institute of Michigan company nor Spark of Creation Therapy company has reported experiencing a ransomware attack publicly.

Neither DBT Institute of Michigan company nor Spark of Creation Therapy company has reported experiencing a data breach publicly.

Neither DBT Institute of Michigan company nor Spark of Creation Therapy company has reported experiencing targeted cyberattacks publicly.

Neither Spark of Creation Therapy company nor DBT Institute of Michigan company has reported experiencing or disclosing vulnerabilities publicly.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Spark of Creation Therapy company nor DBT Institute of Michigan company has publicly disclosed detailed information about the number of their subsidiaries.

DBT Institute of Michigan company employs more people globally than Spark of Creation Therapy company, reflecting its scale as a Mental Health Care.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds SOC 2 Type 1 certification.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds SOC 2 Type 2 certification.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds ISO 27001 certification.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds PCI DSS certification.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds HIPAA certification.

Neither Spark of Creation Therapy nor DBT Institute of Michigan holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H