Company Details
specsavers
27,385
155,117
43
specsavers.com
0
SPE_3359797
In-progress


Specsavers Company CyberSecurity Posture
specsavers.comSpecsavers began 40 years ago with the vision of two optometrists, Doug and Mary Perkins, who set out to provide best-value eyecare to everybody. Their passion for optometry has led Specsavers to become the largest privately-owned optical group in the world, delivering high-quality, affordable optical and hearing care in 12 countries. And it continues to shape the lives and experience of around 41,000 colleagues who are developing their careers with us across the globe.
Company Details
specsavers
27,385
155,117
43
specsavers.com
0
SPE_3359797
In-progress
Between 750 and 799

Specsavers Global Score (TPRM)XXXX

Description: Eyewear giant Specsavers has admitted that the personal information of some clients in regional Queensland was missing. The exposed information includes the name, date of birth, address, phone number, email address, clinical records of optometry tests, and Medicare details. How the information was compromised is still being investigated, but it appears a physical computer server was stolen. Details supplied to customers said the information disappeared while refurbishment works at the Stockland Shopping Centre store were underway.


No incidents recorded for Specsavers in 2026.
No incidents recorded for Specsavers in 2026.
No incidents recorded for Specsavers in 2026.
Specsavers cyber incidents detection timeline including parent company and subsidiaries

Specsavers began 40 years ago with the vision of two optometrists, Doug and Mary Perkins, who set out to provide best-value eyecare to everybody. Their passion for optometry has led Specsavers to become the largest privately-owned optical group in the world, delivering high-quality, affordable optical and hearing care in 12 countries. And it continues to shape the lives and experience of around 41,000 colleagues who are developing their careers with us across the globe.

Sally Beauty Holdings, Inc. (“Sally”) through its affiliates is the world’s largest distributor of professional beauty supplies. Sally provides the channels that allow manufacturers of beauty supplies to reach customers, both professional and non-professional. Sally Beauty Company, Inc. began a

Welcome to Pick n Pay, where family values and customer-centricity converge to create an unparalleled shopping experience. Since 1967, when the visionary Raymond Ackerman championed the cause of consumers by acquiring the first few stores, the Ackerman family's dedication has steered our journey of

Mercadona is a leading company of physical supermarkets in Spain with an online service, with over 1,610 stores and more than 5.9 million households as customers. Additionally, it has 60 stores in Portugal, with a presence in nine different districts. A family-owned company, its objective is to off

Arbonne, creates personal skincare and wellness products that are crafted with premium botanical ingredients and innovative scientific discovery. Delivering on the Company’s commitment to pure, safe and beneficial products, Arbonne’s personal care and nutrition formulas are vegan certified and adher
Here at Wawa, the sky's the limit. Voted as “America’s Favorite Convenience Store,” Wawa operates a chain of convenience retail stores located in Pennsylvania, New Jersey, Delaware, Maryland, West Virginia, Indiana, Ohio, Kentucky, Virginia, North Carolina, Georgia, Alabama, Florida, and Washingto
Big Lots is an off-price retailer, offering bargains on everything for the home, including furniture, décor, pantry essentials, kitchenware, pet supplies, and more. Big Lots fulfills its mission to help customers "Live Big and Save Lots" by strategically sourcing bargains in a variety of creative w

Colruyt Group operates in the food and non-food distribution sector in Belgium, France and Luxembourg with more than 700 own stores and over 1.000 affiliated stores. In Belgium, this includes Colruyt Lowest Prices, Okay, Comarkt, Bio-Planet, Cru, Bike Republic, Zeb, PointCarré, The Fashion Store and
Victoria’s Secret & Co. (NYSE: VSCO) is a specialty retailer of modern, fashion-inspired collections including signature bras, panties, lingerie, casual sleepwear, athleisure and swim, as well as award-winning prestige fragrances and body care. VS&Co is comprised of market leading brands, Victoria’s

Our team of friendly faces works as one to provide shopping trips and a career experience you won’t find anywhere else. Together we work the Morrisons way. Constantly looking to do things even better, we work in partnership with our communities, colleagues, suppliers and British farmers to provide
.png)
Gemma Oxley, head of people – group functions at Specsavers, shares her vision for the future of HR.
Walk into any Specsavers, and the first thing you'll notice is what isn't there—no cold, clinical lighting, no dizzying wall of frames,...
International optometry company Specsavers has paused the global standardization of its Oracle ERP system and moved to third-party support, saving £5 million.
Commercial property consultancy Innes England has won the contract to manage ng2, one of Nottingham's premier business parks.
Oracle's cloud has been judged too risky, too expensive and not up to scratch by Specsavers, which is aiming to complete an AWS and Azure...
Optician chain Specsavers has selected eClinicalWorks to provide electronic patient records for all its 500 stores in the UK and.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Specsavers is https://join.specsavers.com.
According to Rankiteo, Specsavers’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, Specsavers currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Specsavers has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Specsavers is not certified under SOC 2 Type 1.
According to Rankiteo, Specsavers does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Specsavers is not listed as GDPR compliant.
According to Rankiteo, Specsavers does not currently maintain PCI DSS compliance.
According to Rankiteo, Specsavers is not compliant with HIPAA regulations.
According to Rankiteo,Specsavers is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Specsavers operates primarily in the Retail industry.
Specsavers employs approximately 27,385 people worldwide.
Specsavers presently has no subsidiaries across any sectors.
Specsavers’s official LinkedIn profile has approximately 155,117 followers.
Specsavers is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Specsavers does not have a profile on Crunchbase.
Yes, Specsavers maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/specsavers.
As of January 24, 2026, Rankiteo reports that Specsavers has experienced 1 cybersecurity incidents.
Specsavers has an estimated 15,596 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Specsavers Data Breach in Queensland
Description: Eyewear giant Specsavers has admitted that the personal information of some clients in regional Queensland was missing. The exposed information includes the name, date of birth, address, phone number, email address, clinical records of optometry tests, and Medicare details. How the information was compromised is still being investigated, but it appears a physical computer server was stolen. Details supplied to customers said the information disappeared while refurbishment works at the Stockland Shopping Centre store were underway.
Type: Data Breach
Attack Vector: Physical Theft
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Name, Date of birth, Address, Phone number, Email address, Clinical records of optometry tests, Medicare details
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Clinical Records, Medicare Details and .

Entity Name: Specsavers
Entity Type: Retail
Industry: Optical Goods
Location: Regional Queensland

Type of Data Compromised: Personal information, Clinical records, Medicare details
Sensitivity of Data: High
Personally Identifiable Information: Yes

Investigation Status: Ongoing
Most Significant Data Compromised: The most significant data compromised in an incident were Name, Date of Birth, Address, Phone Number, Email Address, Clinical Records of Optometry Tests, Medicare Details and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Name, Clinical Records of Optometry Tests, Medicare Details, Date of Birth, Address, Phone Number and Email Address.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.