Company Details
tandemdiabetes
2,186
78,768
3391
tandemdiabetes.com
18
TAN_1776584
Completed

Tandem Diabetes Care Company CyberSecurity Posture
tandemdiabetes.comTandem Diabetes Care, a global insulin delivery and diabetes technology company, manufactures and sells advanced automated insulin delivery systems that reduce the burden of diabetes management, while creating new possibilities for patients, their loved ones, and healthcare providers. The Company’s pump portfolio features the Tandem Mobi system and t:slim X2 insulin pump, both of which feature Control-IQ advanced hybrid closed-loop technology. Tandem is the #1 recommended insulin pump brand by people living with diabetes, four years and counting. (dQ&A US Diabetes Connections Patient Panel Report; Net Promoter Score; Q1 2019-Q3 2023: P.49, Q3 2023 (Jan. 2019-Sept. 2023). Tandem Diabetes Care is based in San Diego, California. For more information, visit tandemdiabetes.com. SAFETY INFORMATION Please note that this account is not intended to be used for product support or medical advice. If you are having a medical emergency, please dial 911. If you are having an issue with one of our products and need immediate assistance, please call our 24-hour customer support team at 877-801-6901 and press 1 twice. RX ONLY. Indicated for patients with type 1 diabetes, 6 years and older. WARNING: Control-IQ technology should not be used by people under age 6, or who use less than 10 units of insulin/day, or who weigh less than 55 lbs. Safety info: tandemdiabetes.com/safetyinfo.
Company Details
tandemdiabetes
2,186
78,768
3391
tandemdiabetes.com
18
TAN_1776584
Completed
Between 700 and 749

TDC Global Score (TPRM)XXXX

Description: On March 17, 2020, the California Office of the Attorney General reported a data breach involving Tandem Diabetes Care. The breach occurred between January 17, 2020, and January 20, 2020, and involved unauthorized access to employee email accounts through a phishing incident. This potentially affected the personal information of 438 individuals in Rhode Island, including names, contact information, Social Security numbers, and clinical data.


No incidents recorded for Tandem Diabetes Care in 2025.
No incidents recorded for Tandem Diabetes Care in 2025.
No incidents recorded for Tandem Diabetes Care in 2025.
TDC cyber incidents detection timeline including parent company and subsidiaries

Tandem Diabetes Care, a global insulin delivery and diabetes technology company, manufactures and sells advanced automated insulin delivery systems that reduce the burden of diabetes management, while creating new possibilities for patients, their loved ones, and healthcare providers. The Company’s pump portfolio features the Tandem Mobi system and t:slim X2 insulin pump, both of which feature Control-IQ advanced hybrid closed-loop technology. Tandem is the #1 recommended insulin pump brand by people living with diabetes, four years and counting. (dQ&A US Diabetes Connections Patient Panel Report; Net Promoter Score; Q1 2019-Q3 2023: P.49, Q3 2023 (Jan. 2019-Sept. 2023). Tandem Diabetes Care is based in San Diego, California. For more information, visit tandemdiabetes.com. SAFETY INFORMATION Please note that this account is not intended to be used for product support or medical advice. If you are having a medical emergency, please dial 911. If you are having an issue with one of our products and need immediate assistance, please call our 24-hour customer support team at 877-801-6901 and press 1 twice. RX ONLY. Indicated for patients with type 1 diabetes, 6 years and older. WARNING: Control-IQ technology should not be used by people under age 6, or who use less than 10 units of insulin/day, or who weigh less than 55 lbs. Safety info: tandemdiabetes.com/safetyinfo.

Zimmer Biomet is a global medical technology leader with a comprehensive portfolio designed to maximize mobility and improve health. We advance our mission to alleviate pain and improve the quality of life for patients around the world with our innovative products and suite of integrated digital and

Danaher is a leading global life sciences and diagnostics innovator, committed to accelerating the power of science and technology to improve human health. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of scie
STERIS is a leading provider of infection prevention and other procedural products and services, focused primarily on healthcare, pharmaceutical and medical device Customers. MISSION WE HELP OUR CUSTOMERS CREATE A HEALTHIER AND SAFER WORLD by providing innovative healthcare and life science product

For nearly a century, we have delivered on our commitment to saving and sustaining the lives of patients, working alongside clinicians and providers around the world. We believe every person — regardless of who they are or where they are from — deserves a chance to live a healthy life, free from ill

Boston Scientific transforms lives through innovative medical technologies that improve the health of patients around the world. As a global medical technology leader for more than 40 years, we advance science for life by providing a broad range of high-performance solutions that address unmet patie

A global leader in advanced diagnostics, Beckman Coulter has challenged convention to elevate the diagnostic laboratory’s role in improving patient health for more than 80 years. Our mission is to Relentlessly Reimagine Healthcare, One Diagnosis at a Time – and we do this by applying the power of sc

Smith+Nephew is a global medical technology company. We design and manufacture technology that takes the limits off living. We support healthcare professionals to return their patients to health and mobility, helping them to perform at their fullest potential. From our first employee and founder, T

Alcon helps people see brilliantly. As the global leader in eye care with a heritage spanning over 75 years, we offer the broadest portfolio of products to enhance sight and improve people’s lives. Our Surgical and Vision Care products touch the lives of more than 260 million people in over 140 coun

As a leading medical technology company, B. Braun protects and improves the health of people around the world. For more than 185 years, the family-owned company has been accelerating progress in health care with pioneering spirit and groundbreaking contributions. This innovative strength continues t
.png)
Tandem Diabetes Care ( ($TNDM) ) has issued an announcement. On November 7, 2025, Tandem Diabetes Care appointed Sandra Beaver to its Board of Dire...
Rosen Law Firm's probe into Tandem Diabetes Care (TNDM) after a voluntary correction of certain t:slim X2 insulin pumps, and the roughly 20%...
Uncover advancements in cyber security and cloud computing at Cyber Security & Cloud Expo North America on 18-19 May 2026 at San Jose McEnery Convention...
This week's Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO,...
Tandem Diabetes Care ( ($TNDM) ) has issued an announcement. On November 7, 2025, Tandem Diabetes Care appointed Sandra Beaver to its Board of Directors,...
Tandem Diabetes Care Announces Appointment of Sandra Beaver to Board of Directors. Tandem Diabetes Care, Inc. (Nasdaq: TNDM),...
SAN DIEGO - Tandem Diabetes Care, Inc. (NASDAQ:TNDM), an insulin delivery and diabetes technology company, announced Wednesday the...
Tandem Diabetes Care, an insulin delivery and diabetes technology company, announced it received FDA clearance for the Android version of...
Tandem Diabetes Care, Inc. (Nasdaq: TNDM), a global insulin delivery and diabetes technology company, today announced that the U.S. Food and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Tandem Diabetes Care is http://www.tandemdiabetes.com.
According to Rankiteo, Tandem Diabetes Care’s AI-generated cybersecurity score is 745, reflecting their Moderate security posture.
According to Rankiteo, Tandem Diabetes Care currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Tandem Diabetes Care is not certified under SOC 2 Type 1.
According to Rankiteo, Tandem Diabetes Care does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Tandem Diabetes Care is not listed as GDPR compliant.
According to Rankiteo, Tandem Diabetes Care does not currently maintain PCI DSS compliance.
According to Rankiteo, Tandem Diabetes Care is not compliant with HIPAA regulations.
According to Rankiteo,Tandem Diabetes Care is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Tandem Diabetes Care operates primarily in the Medical Equipment Manufacturing industry.
Tandem Diabetes Care employs approximately 2,186 people worldwide.
Tandem Diabetes Care presently has no subsidiaries across any sectors.
Tandem Diabetes Care’s official LinkedIn profile has approximately 78,768 followers.
Tandem Diabetes Care is classified under the NAICS code 3391, which corresponds to Medical Equipment and Supplies Manufacturing.
No, Tandem Diabetes Care does not have a profile on Crunchbase.
Yes, Tandem Diabetes Care maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tandemdiabetes.
As of December 18, 2025, Rankiteo reports that Tandem Diabetes Care has experienced 1 cybersecurity incidents.
Tandem Diabetes Care has an estimated 5,587 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Tandem Diabetes Care Data Breach
Description: Unauthorized access to employee email accounts through a phishing incident, potentially affecting personal information of individuals, including names, contact information, Social Security numbers, and clinical data.
Date Detected: 2020-01-17
Date Publicly Disclosed: 2020-03-17
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Human Error
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing Email.

Data Compromised: Names, Contact information, Social security numbers, Clinical data
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Contact Information, Social Security Numbers, Clinical Data and .

Entity Name: Tandem Diabetes Care
Entity Type: Company
Industry: Healthcare
Location: Rhode Island
Customers Affected: 438

Type of Data Compromised: Names, Contact information, Social security numbers, Clinical data
Number of Records Exposed: 438
Sensitivity of Data: High

Source: California Office of the Attorney General
Date Accessed: 2020-03-17
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2020-03-17.

Entry Point: Phishing Email

Root Causes: Phishing Email
Most Recent Incident Detected: The most recent incident detected was on 2020-01-17.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-03-17.
Most Significant Data Compromised: The most significant data compromised in an incident were names, contact information, Social Security numbers, clinical data and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were clinical data, contact information, Social Security numbers and names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 438.0.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing Email.
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.