Company Details
swspd
3
23
6114
swspd.org
0
SOU_2278412
In-progress


SouthWestern Society of Pediatric Dentistry Company CyberSecurity Posture
swspd.orgThe SouthWestern Society of Pediatric Dentistry was established to fill the need for more knowledge in this limited practice field and for fellowship. In early 1948, eight dentists unofficially formed the SouthWestern Society of Pedodontists at the Dallas Mid-Winter Meeting. They were Wayne Rose (Wichita, KS), Julian (Tubbs) Raffkind (San Antonio, TX), Joe Peabody (Houston, TX), Garnett Yearwood (Shreveport, LA), Ben Caudle (Tulsa, OK), Sumner Russman (Oklahoma City, OK), Dean Robertson (Oklahoma City, OK), and Paul Taylor (Dallas, TX). The fledgling pedodontist group subsequently presented a Constitution and By-Laws for study and development, using the structure of the Southwestern Society of Orthodontists as a model. At the 1949 Dallas Mid-Winter Meeting, officers were elected, the Constitution and By-Laws were adopted and the Society was incorporated in the State of Kansas. The first annual meeting was held in the summer of 1949 in Oklahoma City. It was the beginning of a wonderful professional relationship for the eight dentists. Soon membership doubled in size with more building to it each year. Learning came from two sources: (a) Learned academia group and (b) Informal sessions. The tradition continues today. Today, the SouthWestern Society of Pediatric Dentistry is a nationally recognized entity. The membership has contributed much of themselves not only to patients but to student learning and adjusting our entity to the changes in professional service structure.
Company Details
swspd
3
23
6114
swspd.org
0
SOU_2278412
In-progress
Between 650 and 699

SSPD Global Score (TPRM)XXXX

Description: Ransomware Attack Exposes Sensitive Data of Pediatric Dentistry of Oklahoma Patients Pediatric Dentistry of Oklahoma, based in Oklahoma City, recently disclosed a data breach stemming from a sophisticated ransomware attack on its third-party management company. The incident was detected on February 14, 2024, when unauthorized access to the network triggered an immediate response, including system lockdowns and an internal investigation. Forensic analysis revealed that protected health information (PHI) and personally identifiable information (PII) of patients may have been accessed by threat actors. Exposed data includes names, addresses, dates of birth, Social Security numbers, driver’s license numbers, medical and dental histories, treatment details, medication records, and insurance information. The combination of sensitive health and identity data heightens risks for affected individuals, including potential identity theft and fraud. While the exact number of impacted patients remains undisclosed, the breach is classified as severe due to the nature of the compromised data and the use of ransomware a tactic often linked to data exfiltration and extortion. As of now, there is no evidence that the stolen information has been misused, though the possibility cannot be dismissed. Pediatric Dentistry of Oklahoma is notifying affected individuals by mail and has provided resources for identity theft protection, including a dedicated contact line (405-946-2455) and mailing address (3613 NW 56th St., Suite 105, Oklahoma City, OK 73112). The practice has also directed patients to Federal Trade Commission (FTC) guidance for additional support. The incident underscores the growing threat of ransomware targeting healthcare providers and their vendors, where sensitive patient data remains a prime target.


No incidents recorded for SouthWestern Society of Pediatric Dentistry in 2026.
No incidents recorded for SouthWestern Society of Pediatric Dentistry in 2026.
No incidents recorded for SouthWestern Society of Pediatric Dentistry in 2026.
SSPD cyber incidents detection timeline including parent company and subsidiaries

The SouthWestern Society of Pediatric Dentistry was established to fill the need for more knowledge in this limited practice field and for fellowship. In early 1948, eight dentists unofficially formed the SouthWestern Society of Pedodontists at the Dallas Mid-Winter Meeting. They were Wayne Rose (Wichita, KS), Julian (Tubbs) Raffkind (San Antonio, TX), Joe Peabody (Houston, TX), Garnett Yearwood (Shreveport, LA), Ben Caudle (Tulsa, OK), Sumner Russman (Oklahoma City, OK), Dean Robertson (Oklahoma City, OK), and Paul Taylor (Dallas, TX). The fledgling pedodontist group subsequently presented a Constitution and By-Laws for study and development, using the structure of the Southwestern Society of Orthodontists as a model. At the 1949 Dallas Mid-Winter Meeting, officers were elected, the Constitution and By-Laws were adopted and the Society was incorporated in the State of Kansas. The first annual meeting was held in the summer of 1949 in Oklahoma City. It was the beginning of a wonderful professional relationship for the eight dentists. Soon membership doubled in size with more building to it each year. Learning came from two sources: (a) Learned academia group and (b) Informal sessions. The tradition continues today. Today, the SouthWestern Society of Pediatric Dentistry is a nationally recognized entity. The membership has contributed much of themselves not only to patients but to student learning and adjusting our entity to the changes in professional service structure.


L'AFPA, PREMIER ORGANISME DE FORMATION PROFESSIONNELLE DES ADULTES Avec plus de 140 000 personnes formées chaque année dans plus de 200 implantations partout en France, l’Afpa, devenue Agence nationale pour la formation professionnelle des adultes en janvier 2017, est depuis plus de 65 ans, le pr

I created "My own company" in order to be able to invoice my clients, but I am now fully retired. I spend a fair share of my leisure time enhancing my "hobby" website (https://anglais-pratique.fr/), which is primarily intended for French speakers who wish to improve their English. I want to leave th
.png)
Punjab Governor and UT Administrator Gulab Chand Kataria on Saturday stressed the need to create a dedicated and trained team to strengthen...
Berlin promises to take down bad cyber actors and a new report prompts questions of whether police should carry Tasers to keep them from...
Disappearing topsoil is a big problem for land and bottom line. Expert advice for picking the best bull genetics. Keeping cattle right where...
Introduction. Many security leaders didn't authorize AI expansion. It happened around them. Someone plugged in a copilot in a SaaS tool or...
It's been a busy time for New Zealand's National Cyber Security Centre as it takes an unprecedentedly proactive posture to cyber threats.
Data deletion is a great way to reduce your digital footprint and lower the risk of cybercrime – here's a guide to deleting your data...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter...
As Brussels prepares to present the revised EU Cybersecurity Act, it has a rare opportunity to strengthen the foundations, creating a more...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of SouthWestern Society of Pediatric Dentistry is http://swspd.org.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry’s AI-generated cybersecurity score is 689, reflecting their Weak security posture.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry is not certified under SOC 2 Type 1.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry does not hold a SOC 2 Type 2 certification.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry is not listed as GDPR compliant.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry does not currently maintain PCI DSS compliance.
According to Rankiteo, SouthWestern Society of Pediatric Dentistry is not compliant with HIPAA regulations.
According to Rankiteo,SouthWestern Society of Pediatric Dentistry is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
SouthWestern Society of Pediatric Dentistry operates primarily in the Professional Training and Coaching industry.
SouthWestern Society of Pediatric Dentistry employs approximately 3 people worldwide.
SouthWestern Society of Pediatric Dentistry presently has no subsidiaries across any sectors.
SouthWestern Society of Pediatric Dentistry’s official LinkedIn profile has approximately 23 followers.
SouthWestern Society of Pediatric Dentistry is classified under the NAICS code 6114, which corresponds to Business Schools and Computer and Management Training.
No, SouthWestern Society of Pediatric Dentistry does not have a profile on Crunchbase.
Yes, SouthWestern Society of Pediatric Dentistry maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/swspd.
As of January 25, 2026, Rankiteo reports that SouthWestern Society of Pediatric Dentistry has experienced 1 cybersecurity incidents.
SouthWestern Society of Pediatric Dentistry has an estimated 6,993 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with forensic specialists, and containment measures with immediate action to secure systems, and communication strategy with notification by mail to affected individuals..
Title: Pediatric Dentistry of Oklahoma Data Breach
Description: Pediatric Dentistry of Oklahoma was involved in a data breach involving sensitive patient information due to a sophisticated ransomware attack on its third-party management company.
Date Detected: 2024-02-14
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Protected health information (PHI) and personally identifiable information (PII)
Systems Affected: Third-party management company's network
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Names, Addresses, Dates Of Birth, Social Security Numbers, Driver’S License Numbers, Limited Medical And Dental Histories, Medical And Dental Diagnoses And/Or Treatment Information, Medication Details, Medical And Dental Insurance Information and .

Entity Name: Pediatric Dentistry of Oklahoma
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Oklahoma City, Oklahoma, USA

Third Party Assistance: Forensic specialists
Containment Measures: Immediate action to secure systems
Communication Strategy: Notification by mail to affected individuals
Third-Party Assistance: The company involves third-party assistance in incident response through Forensic specialists.

Type of Data Compromised: Patient names, Addresses, Dates of birth, Social security numbers, Driver’s license numbers, Limited medical and dental histories, Medical and dental diagnoses and/or treatment information, Medication details, Medical and dental insurance information
Sensitivity of Data: High
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by immediate action to secure systems.

Data Exfiltration: Potential

Recommendations: Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes, report suspicious activity to financial institutions and law enforcement.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes and report suspicious activity to financial institutions and law enforcement..

Source: Data breach notification
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Data breach notification.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification by mail to affected individuals.

Customer Advisories: Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes, report suspicious activity.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes and report suspicious activity..
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Forensic specialists.
Most Recent Incident Detected: The most recent incident detected was on 2024-02-14.
Most Significant Data Compromised: The most significant data compromised in an incident was Protected health information (PHI) and personally identifiable information (PII).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Forensic specialists.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Immediate action to secure systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Protected health information (PHI) and personally identifiable information (PII).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes and report suspicious activity to financial institutions and law enforcement..
Most Recent Source: The most recent source of information about an incident is Data breach notification.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Monitor account statements, obtain free credit reports, consider placing fraud alerts or credit freezes and report suspicious activity.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.