Comparison Overview

The Aurora House

VS

CHICAGO CENTER FOR INTEGRATION AND HEALING

The Aurora House

undefined, Cheshire, undefined, undefined, US
Last Update: 2026-01-22

The Aurora House, nestled in the heart of Cheshire's Historic District, offers women supportive, transformative, and discreet sober living. Two and three bedroom suites provide semi private living in a quiet community, just twenty minutes outside of New Haven and thirty minutes from West Hartford Center. ​ Residents at The Aurora House are provided full access to the services offered at the adjacent Aurora Center in an effort to provide a supported reintegration into substance free living. From career and educational counseling, to individual, group, and holistic therapies, residents are provided a full compliment of services. Most importantly, services are uniquely tailored to meet the individual needs of our residents. Each woman works with an Aurora Center clinician to design an individualized care plan specific to her life goals. ​ The freedom to begin again is one of the most simple and profound experiences of early recovery. Whether it is learning to manage walking around town with money in their wallets, repairing, maintaining and fostering new relationships, finding work, continuing education, or simply learning how to have fun in sobriety, women may find that each day presents a wide range of opportunities and challenges. At The Aurora House, women are guided through the rocky process of re-establishing meaningful lives with love, acceptance, and understanding.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

CHICAGO CENTER FOR INTEGRATION AND HEALING

4700 N RAVENSWOOD AVE, CHICAGO, 60640, US
Last Update: 2026-01-22
Between 750 and 799

Traumatic experiences leave a legacy in our bodies and minds. They have pervasive effects on one’s nervous system, relationships, and sense of self in the world. They disrupt our capacity to experience a sense of safety, integrity and of connection. At CCIH we believe that by co-creating the right treatment and support, each person has a tremendous capacity to heal.

NAICS: 62133
NAICS Definition: Offices of Mental Health Practitioners (except Physicians)
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-aurora-house.jpeg
The Aurora House
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/chicago-center-for-integration-and-healing.jpeg
CHICAGO CENTER FOR INTEGRATION AND HEALING
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Aurora House
100%
Compliance Rate
0/4 Standards Verified
CHICAGO CENTER FOR INTEGRATION AND HEALING
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for The Aurora House in 2026.

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for CHICAGO CENTER FOR INTEGRATION AND HEALING in 2026.

Incident History — The Aurora House (X = Date, Y = Severity)

The Aurora House cyber incidents detection timeline including parent company and subsidiaries

Incident History — CHICAGO CENTER FOR INTEGRATION AND HEALING (X = Date, Y = Severity)

CHICAGO CENTER FOR INTEGRATION AND HEALING cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-aurora-house.jpeg
The Aurora House
Incidents

No Incident

https://images.rankiteo.com/companyimages/chicago-center-for-integration-and-healing.jpeg
CHICAGO CENTER FOR INTEGRATION AND HEALING
Incidents

No Incident

FAQ

The Aurora House company demonstrates a stronger AI Cybersecurity Score compared to CHICAGO CENTER FOR INTEGRATION AND HEALING company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, CHICAGO CENTER FOR INTEGRATION AND HEALING company has disclosed a higher number of cyber incidents compared to The Aurora House company.

In the current year, CHICAGO CENTER FOR INTEGRATION AND HEALING company and The Aurora House company have not reported any cyber incidents.

Neither CHICAGO CENTER FOR INTEGRATION AND HEALING company nor The Aurora House company has reported experiencing a ransomware attack publicly.

Neither CHICAGO CENTER FOR INTEGRATION AND HEALING company nor The Aurora House company has reported experiencing a data breach publicly.

Neither CHICAGO CENTER FOR INTEGRATION AND HEALING company nor The Aurora House company has reported experiencing targeted cyberattacks publicly.

Neither The Aurora House company nor CHICAGO CENTER FOR INTEGRATION AND HEALING company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds any compliance certifications.

Neither company holds any compliance certifications.

Neither The Aurora House company nor CHICAGO CENTER FOR INTEGRATION AND HEALING company has publicly disclosed detailed information about the number of their subsidiaries.

Both The Aurora House company and CHICAGO CENTER FOR INTEGRATION AND HEALING company employ a similar number of people globally.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds SOC 2 Type 1 certification.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds SOC 2 Type 2 certification.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds ISO 27001 certification.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds PCI DSS certification.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds HIPAA certification.

Neither The Aurora House nor CHICAGO CENTER FOR INTEGRATION AND HEALING holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.