Company Details
tech-start-ucalgary
34
851
5112
techstartucalgary.com
0
TEC_1027816
In-progress

Tech Start UCalgary Company CyberSecurity Posture
techstartucalgary.comWe are a club at the University of Calgary that strives to connect software development with entrepreneurship and innovation. Our goal is to create a platform for like minded individuals to come together and work on innovative projects fueled by their ideas. Check out our linktree! https://linktr.ee/techstartuofc
Company Details
tech-start-ucalgary
34
851
5112
techstartucalgary.com
0
TEC_1027816
In-progress
Between 700 and 749

TSU Global Score (TPRM)XXXX

Description: The University of Calgary was targeted in a ransomware attack in June 2016. There were no indication that any personal or other university data was released to the public. The university has paid the $20,000 Cdn ransom that was asked as part of this ransomware attack as part of attempts to maintain all alternatives to fix these system concerns.


No incidents recorded for Tech Start UCalgary in 2025.
No incidents recorded for Tech Start UCalgary in 2025.
No incidents recorded for Tech Start UCalgary in 2025.
TSU cyber incidents detection timeline including parent company and subsidiaries

We are a club at the University of Calgary that strives to connect software development with entrepreneurship and innovation. Our goal is to create a platform for like minded individuals to come together and work on innovative projects fueled by their ideas. Check out our linktree! https://linktr.ee/techstartuofc


HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Thomson Reuters is the world’s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod
Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa
Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, hybrid cloud, edge, and Kubernetes technologies. We hire creative, passionate people who are ready to contribute their ideas, help solve complex problems
Catalyzing the era of pervasive intelligence, Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation. We partner closely with semiconductor and systems customers across a wide range of

Walmart has a long history of transforming retail and using technology to deliver innovations that improve how the world shops and empower our 2.1 million associates. It began with Sam Walton and continues today with Global Tech associates working together to power Walmart and lead the next retail d

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150
.png)
UCalgary's cybersecurity director explains the risk and outlines how you can stay safe online.
The highly anticipated qConnect 2024 summit, held over two inspiring days, successfully brought together quantum creators and technology...
Jordan Smith says university's innovation and mentorship ecosystem was pivotal to supporting startup QTi, a provider of quantum-based...
Funding from National Cybersecurity Consortium one of the largest in Faculty of Law School's history.
She's a cybersecurity expert who is pioneering the use of AI to protect critical infrastructure, while advocating for gender diversity in her field.
Cybersecurity webinar Oct. 26 offers tools and tactics you can use for online security.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Tech Start UCalgary is http://techstartucalgary.com.
According to Rankiteo, Tech Start UCalgary’s AI-generated cybersecurity score is 736, reflecting their Moderate security posture.
According to Rankiteo, Tech Start UCalgary currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Tech Start UCalgary is not certified under SOC 2 Type 1.
According to Rankiteo, Tech Start UCalgary does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Tech Start UCalgary is not listed as GDPR compliant.
According to Rankiteo, Tech Start UCalgary does not currently maintain PCI DSS compliance.
According to Rankiteo, Tech Start UCalgary is not compliant with HIPAA regulations.
According to Rankiteo,Tech Start UCalgary is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Tech Start UCalgary operates primarily in the Software Development industry.
Tech Start UCalgary employs approximately 34 people worldwide.
Tech Start UCalgary presently has no subsidiaries across any sectors.
Tech Start UCalgary’s official LinkedIn profile has approximately 851 followers.
Tech Start UCalgary is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Tech Start UCalgary does not have a profile on Crunchbase.
Yes, Tech Start UCalgary maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tech-start-ucalgary.
As of December 16, 2025, Rankiteo reports that Tech Start UCalgary has experienced 1 cybersecurity incidents.
Tech Start UCalgary has an estimated 27,768 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $20 thousand.
Title: Ransomware Attack on University of Calgary
Description: The University of Calgary was targeted in a ransomware attack in June 2016. There were no indications that any personal or other university data was released to the public. The university paid the $20,000 Cdn ransom as part of attempts to maintain all alternatives to fix these system concerns.
Date Detected: June 2016
Type: Ransomware Attack
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Financial Loss: 20,000 Cdn
Average Financial Loss: The average financial loss per incident is $20.00 thousand.

Entity Name: University of Calgary
Entity Type: Educational Institution
Industry: Education
Location: Calgary, Canada
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was 20,000 Cdn.
Most Recent Incident Detected: The most recent incident detected was on June 2016.
Highest Financial Loss: The highest financial loss from an incident was 20,000 Cdn.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 20,000 Cdn.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was 20,000 Cdn.
.png)
Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.