ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Tandem Diabetes Care, a global insulin delivery and diabetes technology company, manufactures and sells advanced automated insulin delivery systems that reduce the burden of diabetes management, while creating new possibilities for patients, their loved ones, and healthcare providers. The Company’s pump portfolio features the Tandem Mobi system and t:slim X2 insulin pump, both of which feature Control-IQ advanced hybrid closed-loop technology. Tandem is the #1 recommended insulin pump brand by people living with diabetes, four years and counting. (dQ&A US Diabetes Connections Patient Panel Report; Net Promoter Score; Q1 2019-Q3 2023: P.49, Q3 2023 (Jan. 2019-Sept. 2023). Tandem Diabetes Care is based in San Diego, California. For more information, visit tandemdiabetes.com. SAFETY INFORMATION Please note that this account is not intended to be used for product support or medical advice. If you are having a medical emergency, please dial 911. If you are having an issue with one of our products and need immediate assistance, please call our 24-hour customer support team at 877-801-6901 and press 1 twice. RX ONLY. Indicated for patients with type 1 diabetes, 6 years and older. WARNING: Control-IQ technology should not be used by people under age 6, or who use less than 10 units of insulin/day, or who weigh less than 55 lbs. Safety info: tandemdiabetes.com/safetyinfo.

Tandem Diabetes Care A.I CyberSecurity Scoring

TDC

Company Details

Linkedin ID:

tandemdiabetes

Employees number:

2,186

Number of followers:

78,768

NAICS:

3391

Industry Type:

Medical Equipment Manufacturing

Homepage:

tandemdiabetes.com

IP Addresses:

18

Company ID:

TAN_1776584

Scan Status:

Completed

AI scoreTDC Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/tandemdiabetes.jpeg
TDC Medical Equipment Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreTDC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/tandemdiabetes.jpeg
TDC Medical Equipment Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

TDC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Tandem Diabetes Care, Inc.Breach6031/2020
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: On March 17, 2020, the California Office of the Attorney General reported a data breach involving Tandem Diabetes Care. The breach occurred between January 17, 2020, and January 20, 2020, and involved unauthorized access to employee email accounts through a phishing incident. This potentially affected the personal information of 438 individuals in Rhode Island, including names, contact information, Social Security numbers, and clinical data.

Tandem Diabetes Care, Inc.
Breach
Severity: 60
Impact: 3
Seen: 1/2020
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: On March 17, 2020, the California Office of the Attorney General reported a data breach involving Tandem Diabetes Care. The breach occurred between January 17, 2020, and January 20, 2020, and involved unauthorized access to employee email accounts through a phishing incident. This potentially affected the personal information of 438 individuals in Rhode Island, including names, contact information, Social Security numbers, and clinical data.

Ailogo

TDC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for TDC

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

No incidents recorded for Tandem Diabetes Care in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Tandem Diabetes Care in 2025.

Incident Types TDC vs Medical Equipment Manufacturing Industry Avg (This Year)

No incidents recorded for Tandem Diabetes Care in 2025.

Incident History — TDC (X = Date, Y = Severity)

TDC cyber incidents detection timeline including parent company and subsidiaries

TDC Company Subsidiaries

SubsidiaryImage

Tandem Diabetes Care, a global insulin delivery and diabetes technology company, manufactures and sells advanced automated insulin delivery systems that reduce the burden of diabetes management, while creating new possibilities for patients, their loved ones, and healthcare providers. The Company’s pump portfolio features the Tandem Mobi system and t:slim X2 insulin pump, both of which feature Control-IQ advanced hybrid closed-loop technology. Tandem is the #1 recommended insulin pump brand by people living with diabetes, four years and counting. (dQ&A US Diabetes Connections Patient Panel Report; Net Promoter Score; Q1 2019-Q3 2023: P.49, Q3 2023 (Jan. 2019-Sept. 2023). Tandem Diabetes Care is based in San Diego, California. For more information, visit tandemdiabetes.com. SAFETY INFORMATION Please note that this account is not intended to be used for product support or medical advice. If you are having a medical emergency, please dial 911. If you are having an issue with one of our products and need immediate assistance, please call our 24-hour customer support team at 877-801-6901 and press 1 twice. RX ONLY. Indicated for patients with type 1 diabetes, 6 years and older. WARNING: Control-IQ technology should not be used by people under age 6, or who use less than 10 units of insulin/day, or who weigh less than 55 lbs. Safety info: tandemdiabetes.com/safetyinfo.

Loading...
similarCompanies

TDC Similar Companies

Zimmer Biomet

Zimmer Biomet is a global medical technology leader with a comprehensive portfolio designed to maximize mobility and improve health. We advance our mission to alleviate pain and improve the quality of life for patients around the world with our innovative products and suite of integrated digital and

Danaher Corporation

Danaher is a leading global life sciences and diagnostics innovator, committed to accelerating the power of science and technology to improve human health. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of scie

STERIS

STERIS is a leading provider of infection prevention and other procedural products and services, focused primarily on healthcare, pharmaceutical and medical device Customers. MISSION WE HELP OUR CUSTOMERS CREATE A HEALTHIER AND SAFER WORLD by providing innovative healthcare and life science product

Baxter International Inc.

For nearly a century, we have delivered on our commitment to saving and sustaining the lives of patients, working alongside clinicians and providers around the world. We believe every person — regardless of who they are or where they are from — deserves a chance to live a healthy life, free from ill

Boston Scientific

Boston Scientific transforms lives through innovative medical technologies that improve the health of patients around the world. As a global medical technology leader for more than 40 years, we advance science for life by providing a broad range of high-performance solutions that address unmet patie

Beckman Coulter Diagnostics

A global leader in advanced diagnostics, Beckman Coulter has challenged convention to elevate the diagnostic laboratory’s role in improving patient health for more than 80 years. Our mission is to Relentlessly Reimagine Healthcare, One Diagnosis at a Time – and we do this by applying the power of sc

Smith+Nephew

Smith+Nephew is a global medical technology company. We design and manufacture technology that takes the limits off living. We support healthcare professionals to return their patients to health and mobility, helping them to perform at their fullest potential. From our first employee and founder, T

Alcon

Alcon helps people see brilliantly. As the global leader in eye care with a heritage spanning over 75 years, we offer the broadest portfolio of products to enhance sight and improve people’s lives. Our Surgical and Vision Care products touch the lives of more than 260 million people in over 140 coun

B. Braun Group

As a leading medical technology company, B. Braun protects and improves the health of people around the world. For more than 185 years, the family-owned company has been accelerating progress in health care with pioneering spirit and groundbreaking contributions. This innovative strength continues t

newsone

TDC CyberSecurity News

December 05, 2025 02:57 PM
Tandem Diabetes Care Appoints Sandra Beaver to Board

Tandem Diabetes Care ( ($TNDM) ) has issued an announcement. On November 7, 2025, Tandem Diabetes Care appointed Sandra Beaver to its Board of Dire...

December 02, 2025 08:00 AM
Assessing Tandem Diabetes Care’s (TNDM) Valuation After Legal Probe and t:slim X2 Pump Correction Announcement

Rosen Law Firm's probe into Tandem Diabetes Care (TNDM) after a voluntary correction of certain t:slim X2 insulin pumps, and the roughly 20%...

November 20, 2025 01:23 AM
Cyber Security & Cloud Expo North America 2026

Uncover advancements in cyber security and cloud computing at Cyber Security & Cloud Expo North America on 18-19 May 2026 at San Jose McEnery Convention...

November 18, 2025 08:00 AM
Department of Know: Autonomous AI cyberattack, CISOs back to work, bus kill switches

This week's Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO,...

November 12, 2025 02:34 PM
Tandem Diabetes Care Appoints Sandra Beaver to Board

Tandem Diabetes Care ( ($TNDM) ) has issued an announcement. On November 7, 2025, Tandem Diabetes Care appointed Sandra Beaver to its Board of Directors,...

November 12, 2025 08:00 AM
Tandem Diabetes Care Announces Appointment of Sandra Beaver to Board of Directors

Tandem Diabetes Care Announces Appointment of Sandra Beaver to Board of Directors. Tandem Diabetes Care, Inc. (Nasdaq: TNDM),...

November 12, 2025 08:00 AM
Tandem Diabetes Care appoints Sandra Beaver to board of directors

SAN DIEGO - Tandem Diabetes Care, Inc. (NASDAQ:TNDM), an insulin delivery and diabetes technology company, announced Wednesday the...

November 10, 2025 08:00 AM
Tandem Diabetes Care's app cleared by the FDA for Android phones

Tandem Diabetes Care, an insulin delivery and diabetes technology company, announced it received FDA clearance for the Android version of...

November 10, 2025 08:00 AM
Tandem Mobi Receives FDA Clearance for Use with Android Smartphones

Tandem Diabetes Care, Inc. (Nasdaq: TNDM), a global insulin delivery and diabetes technology company, today announced that the U.S. Food and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

TDC CyberSecurity History Information

Official Website of Tandem Diabetes Care

The official website of Tandem Diabetes Care is http://www.tandemdiabetes.com.

Tandem Diabetes Care’s AI-Generated Cybersecurity Score

According to Rankiteo, Tandem Diabetes Care’s AI-generated cybersecurity score is 745, reflecting their Moderate security posture.

How many security badges does Tandem Diabetes Care’ have ?

According to Rankiteo, Tandem Diabetes Care currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Tandem Diabetes Care have SOC 2 Type 1 certification ?

According to Rankiteo, Tandem Diabetes Care is not certified under SOC 2 Type 1.

Does Tandem Diabetes Care have SOC 2 Type 2 certification ?

According to Rankiteo, Tandem Diabetes Care does not hold a SOC 2 Type 2 certification.

Does Tandem Diabetes Care comply with GDPR ?

According to Rankiteo, Tandem Diabetes Care is not listed as GDPR compliant.

Does Tandem Diabetes Care have PCI DSS certification ?

According to Rankiteo, Tandem Diabetes Care does not currently maintain PCI DSS compliance.

Does Tandem Diabetes Care comply with HIPAA ?

According to Rankiteo, Tandem Diabetes Care is not compliant with HIPAA regulations.

Does Tandem Diabetes Care have ISO 27001 certification ?

According to Rankiteo,Tandem Diabetes Care is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Tandem Diabetes Care

Tandem Diabetes Care operates primarily in the Medical Equipment Manufacturing industry.

Number of Employees at Tandem Diabetes Care

Tandem Diabetes Care employs approximately 2,186 people worldwide.

Subsidiaries Owned by Tandem Diabetes Care

Tandem Diabetes Care presently has no subsidiaries across any sectors.

Tandem Diabetes Care’s LinkedIn Followers

Tandem Diabetes Care’s official LinkedIn profile has approximately 78,768 followers.

NAICS Classification of Tandem Diabetes Care

Tandem Diabetes Care is classified under the NAICS code 3391, which corresponds to Medical Equipment and Supplies Manufacturing.

Tandem Diabetes Care’s Presence on Crunchbase

No, Tandem Diabetes Care does not have a profile on Crunchbase.

Tandem Diabetes Care’s Presence on LinkedIn

Yes, Tandem Diabetes Care maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tandemdiabetes.

Cybersecurity Incidents Involving Tandem Diabetes Care

As of December 18, 2025, Rankiteo reports that Tandem Diabetes Care has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Tandem Diabetes Care has an estimated 5,587 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Tandem Diabetes Care ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Tandem Diabetes Care Data Breach

Description: Unauthorized access to employee email accounts through a phishing incident, potentially affecting personal information of individuals, including names, contact information, Social Security numbers, and clinical data.

Date Detected: 2020-01-17

Date Publicly Disclosed: 2020-03-17

Type: Data Breach

Attack Vector: Phishing

Vulnerability Exploited: Human Error

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach TAN628072525

Data Compromised: Names, Contact information, Social security numbers, Clinical data

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Contact Information, Social Security Numbers, Clinical Data and .

Which entities were affected by each incident ?

Incident : Data Breach TAN628072525

Entity Name: Tandem Diabetes Care

Entity Type: Company

Industry: Healthcare

Location: Rhode Island

Customers Affected: 438

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach TAN628072525

Type of Data Compromised: Names, Contact information, Social security numbers, Clinical data

Number of Records Exposed: 438

Sensitivity of Data: High

References

Where can I find more information about each incident ?

Incident : Data Breach TAN628072525

Source: California Office of the Attorney General

Date Accessed: 2020-03-17

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2020-03-17.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach TAN628072525

Entry Point: Phishing Email

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach TAN628072525

Root Causes: Phishing Email

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-01-17.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-03-17.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, contact information, Social Security numbers, clinical data and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were clinical data, contact information, Social Security numbers and names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 438.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing Email.

cve

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=tandemdiabetes' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge