ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Touchpointe is the #1 resource for those diagnosed with cancer. We are fully committed to providing comprehensive answers and unwavering support throughout every stage of their wellness journey. At Touchpointe, we understand the overwhelming challenges and uncertainties that come with a cancer diagnosis. That's why our dedicated team is here to guide and empower individuals, equipping them with the knowledge and resources they need to make informed decisions and navigate their unique path to wellness. With our compassionate approach, we will ensure that every individual on this journey feels deeply supported every step of the way. By fostering a community that understands their unique needs, we aim to provide a sense of solace, knowledge, and encouragement to everyone facing the complexities of cancer.

TouchPointe A.I CyberSecurity Scoring

TouchPointe

Company Details

Linkedin ID:

touchpointe

Employees number:

21

Number of followers:

0

NAICS:

923

Industry Type:

Health and Human Services

Homepage:

TouchPointe.com

IP Addresses:

0

Company ID:

TOU_2102453

Scan Status:

In-progress

AI scoreTouchPointe Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/touchpointe.jpeg
TouchPointe Health and Human Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreTouchPointe Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/touchpointe.jpeg
TouchPointe Health and Human Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

TouchPointe Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

TouchPointe Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for TouchPointe

Incidents vs Health and Human Services Industry Average (This Year)

No incidents recorded for TouchPointe in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for TouchPointe in 2025.

Incident Types TouchPointe vs Health and Human Services Industry Avg (This Year)

No incidents recorded for TouchPointe in 2025.

Incident History — TouchPointe (X = Date, Y = Severity)

TouchPointe cyber incidents detection timeline including parent company and subsidiaries

TouchPointe Company Subsidiaries

SubsidiaryImage

Touchpointe is the #1 resource for those diagnosed with cancer. We are fully committed to providing comprehensive answers and unwavering support throughout every stage of their wellness journey. At Touchpointe, we understand the overwhelming challenges and uncertainties that come with a cancer diagnosis. That's why our dedicated team is here to guide and empower individuals, equipping them with the knowledge and resources they need to make informed decisions and navigate their unique path to wellness. With our compassionate approach, we will ensure that every individual on this journey feels deeply supported every step of the way. By fostering a community that understands their unique needs, we aim to provide a sense of solace, knowledge, and encouragement to everyone facing the complexities of cancer.

Loading...
similarCompanies

TouchPointe Similar Companies

Broward House

Broward House is a not-for-profit social services organization with more than 35 years of experience providing services to our community impacted by HIV and other health concerns. Our Commitment to Health Equity Our mission is to improve the quality of life for individuals impacted with chronic hea

Air Liquide Healthcare

Air Liquide Healthcare is a world leader in medical gases, home healthcare services and specialty ingredients. Our 16,500 employees support 2 million chronic patients and provide medical gases and related services to 20,000 hospitals and new care facilities, as well as 140,000 healthcare professiona

South Lyon Area Recreation Authority

The South Lyon Area Recreation Council was formed effective July 1, 1999 through a cooperative inter-local agreement between Green Oak Township, the Charter Township of Lyon, and the City of South Lyon. The Council effectively became an Authority under Public Act 321 on February 13, 2007. SLARA se

Minnesota Alliance of Recovery Community Organizations

Founded by leaders of Minnesota’s grassroots Recovery Community Organizations (RCOs), MARCO is a statewide nonprofit organization working to build an ecosystem of recovery. We believe that long-term system change starts in our communities and that RCOs are essential partners in building a recovery-o

Heart Support Australia

Heart Support Australia is the peak national body supporting Australians affected by heart disease through peer support. We are a national consumer organisation providing support, encouragement, education and advocacy for heart disease patients and their families. Established in 1989, our mission i

1heart

1heart (1heart.com) builds social impact companies through backing heart-led leaders. We believe in helping to create a more collaborative world where business is used as a force for good. We aim to profit through purpose while positively transforming people's lives and the planet. We are honored t

newsone

TouchPointe CyberSecurity News

December 16, 2021 08:00 AM
Morse Watchmans acquired by TouchPoint, Inc.

OXFORD, Conn.—Morse Watchmans, a leader in key control and asset management systems, has been acquired by TouchPoint, a privately-held...

September 23, 2021 07:00 AM
HP Touchpoint Analytics Client Vulnerable to Privilege Escalation Attacks

HP's hardware performance monitoring tool is vulnerable to severe remote execution attacks. There's a patch that fixes the problems,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

TouchPointe CyberSecurity History Information

Official Website of TouchPointe

The official website of TouchPointe is www.TouchPointe.com.

TouchPointe’s AI-Generated Cybersecurity Score

According to Rankiteo, TouchPointe’s AI-generated cybersecurity score is 818, reflecting their Good security posture.

How many security badges does TouchPointe’ have ?

According to Rankiteo, TouchPointe currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does TouchPointe have SOC 2 Type 1 certification ?

According to Rankiteo, TouchPointe is not certified under SOC 2 Type 1.

Does TouchPointe have SOC 2 Type 2 certification ?

According to Rankiteo, TouchPointe does not hold a SOC 2 Type 2 certification.

Does TouchPointe comply with GDPR ?

According to Rankiteo, TouchPointe is not listed as GDPR compliant.

Does TouchPointe have PCI DSS certification ?

According to Rankiteo, TouchPointe does not currently maintain PCI DSS compliance.

Does TouchPointe comply with HIPAA ?

According to Rankiteo, TouchPointe is not compliant with HIPAA regulations.

Does TouchPointe have ISO 27001 certification ?

According to Rankiteo,TouchPointe is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of TouchPointe

TouchPointe operates primarily in the Health and Human Services industry.

Number of Employees at TouchPointe

TouchPointe employs approximately 21 people worldwide.

Subsidiaries Owned by TouchPointe

TouchPointe presently has no subsidiaries across any sectors.

TouchPointe’s LinkedIn Followers

TouchPointe’s official LinkedIn profile has approximately 0 followers.

NAICS Classification of TouchPointe

TouchPointe is classified under the NAICS code 923, which corresponds to Administration of Human Resource Programs.

TouchPointe’s Presence on Crunchbase

No, TouchPointe does not have a profile on Crunchbase.

TouchPointe’s Presence on LinkedIn

Yes, TouchPointe maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/touchpointe.

Cybersecurity Incidents Involving TouchPointe

As of November 27, 2025, Rankiteo reports that TouchPointe has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

TouchPointe has an estimated 401 peer or competitor companies worldwide.

TouchPointe CyberSecurity History Information

How many cyber incidents has TouchPointe faced ?

Total Incidents: According to Rankiteo, TouchPointe has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at TouchPointe ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=touchpointe' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge