Company Details
town-of-tiverton
32
30
92
ri.gov
0
TOW_1249161
In-progress

Town of Tiverton Company CyberSecurity Posture
ri.govThe Town of Tiverton is an ocean side municipality in Rhode Island. Tiverton is an equal opportunity provider and employer. Tiverton is governed by a 7 member Town Council and Town Administrator.
Company Details
town-of-tiverton
32
30
92
ri.gov
0
TOW_1249161
In-progress
Between 750 and 799

TT Global Score (TPRM)XXXX

Description: Tiverton Town Council was targeted in a cyberattack in February 2017. Every council document stored in the system since 2015 was destroyed when a town clerk unintentionally opened an email that included a virus. The virus infected the town hall IT system.


No incidents recorded for Town of Tiverton in 2025.
No incidents recorded for Town of Tiverton in 2025.
No incidents recorded for Town of Tiverton in 2025.
TT cyber incidents detection timeline including parent company and subsidiaries

The Town of Tiverton is an ocean side municipality in Rhode Island. Tiverton is an equal opportunity provider and employer. Tiverton is governed by a 7 member Town Council and Town Administrator.


INSTITUTO DE SEGURIDAD Y SERVICIOS SOCIALES DE LOS TRABAJADORES DEL ESTADO. ES UN ORGANISMOS PÚBLICO QUE OTORGA SERVICIOS DE SALUD, PENSIONES, VIVIENDA, PRÉSTAMOS, ESTANCIAS INFANTILES, TURISMO, CULTURA, RECREACION, DEPORTE; CUYOS AFILIADOS SON TRABAJADORES DE DEPENDENCIAS GUBERNAMENTALES, CON DERE

MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

State government is the largest employer in Tennessee, with approximately 43,500 employees in the three branches of government. The State of Tennessee has approximately 1,300 different job classifications in areas such as administrative, health services, historic preservation, legal, agriculture, co

The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainabl

Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Ple

Empresa Brasileira de Correios e Telégrafos foi criada como empresa em 1969 por decreto lei. Hoje conta com mais de 100.000 empregados, tem presença em todos os municípios do Brasil. NEGÓCIO: Soluções que aproximam. MISSÃO: Fornecer soluções acessíveis e confiáveis para conectar pessoas, institu

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is

Tallinn is the capital of Estonia. The mission of the city organization is to make Tallinn the best place to live for the people staying here, the desired destination for people arriving here, and a good place of departure for people who start here. For this purpose, the management of Tallinn as a

The Department of Education is responsible for delivering the Victorian Government’s commitment to making Victoria the Education State, where all Victorians have the best learning and development experience, regardless of their background, postcode or circumstances. Education remains a cornerstone f
.png)
More than £30k is set to be invested towards making Tiverton safer through CCTV upgrades. . Mid Devon District Council voted to accept £25k...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Town of Tiverton is http://www.tiverton.ri.gov.
According to Rankiteo, Town of Tiverton’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, Town of Tiverton currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Town of Tiverton is not certified under SOC 2 Type 1.
According to Rankiteo, Town of Tiverton does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Town of Tiverton is not listed as GDPR compliant.
According to Rankiteo, Town of Tiverton does not currently maintain PCI DSS compliance.
According to Rankiteo, Town of Tiverton is not compliant with HIPAA regulations.
According to Rankiteo,Town of Tiverton is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Town of Tiverton operates primarily in the Government Administration industry.
Town of Tiverton employs approximately 32 people worldwide.
Town of Tiverton presently has no subsidiaries across any sectors.
Town of Tiverton’s official LinkedIn profile has approximately 30 followers.
Town of Tiverton is classified under the NAICS code 92, which corresponds to Public Administration.
No, Town of Tiverton does not have a profile on Crunchbase.
Yes, Town of Tiverton maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/town-of-tiverton.
As of December 03, 2025, Rankiteo reports that Town of Tiverton has experienced 1 cybersecurity incidents.
Town of Tiverton has an estimated 11,271 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Malware and Cyber Attack.
Title: Tiverton Town Council Cyberattack
Description: Tiverton Town Council was targeted in a cyberattack in February 2017. Every council document stored in the system since 2015 was destroyed when a town clerk unintentionally opened an email that included a virus. The virus infected the town hall IT system.
Date Detected: February 2017
Type: Cyberattack
Attack Vector: Email
Vulnerability Exploited: Human Error
Title: Cyberattack on Tiverton Town Council
Description: Tiverton Town Council was targeted in a cyberattack in February 2017. Every council document stored in the system since 2015 was destroyed when a town clerk unintentionally opened an email that included a virus. The virus infected the town hall IT system.
Date Detected: February 2017
Type: Malware
Attack Vector: Phishing
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email and Email.

Systems Affected: Town Hall IT System

Data Compromised: Every council document stored in the system since 2015
Systems Affected: Town hall IT system
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Council Documents, , Council Documents and .

Entity Name: Tiverton Town Council
Entity Type: Government
Industry: Public Administration
Location: Tiverton

Entity Name: Tiverton Town Council
Entity Type: Government
Industry: Public Administration
Location: Tiverton

Type of Data Compromised: Council documents

Type of Data Compromised: Council documents

Entry Point: Email

Entry Point: Email

Root Causes: Human Error,
Most Recent Incident Detected: The most recent incident detected was on February 2017.
Most Significant Data Compromised: The most significant data compromised in an incident were Every council document stored in the system since 2015 and .
Most Significant System Affected: The most significant system affected in an incident was Town Hall IT System and Town hall IT system.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Every council document stored in the system since 2015.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.