ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We are a multi-faculty university, which provides high-quality teaching, research and enterprise, and puts student satisfaction at the heart of our work. We welcome everyone who shares our passion for remaking the old and imagining the new. Our university community includes staff, students and other stakeholders in the UK and around the world. With subjects ranging from accountancy to science, we are proud of our excellent standards of teaching. We are based on three attractive, historic campuses in London and Medway, Kent, at the centre of an international network of partners and clients. The university is home to a diverse community of nearly 28,000 students studying in the UK and overseas, one in five of them postgraduate.

University of Greenwich A.I CyberSecurity Scoring

UG

Company Details

Linkedin ID:

university-of-greenwich

Employees number:

5,113

Number of followers:

206,594

NAICS:

6113

Industry Type:

Higher Education

Homepage:

greenwich.ac.uk

IP Addresses:

0

Company ID:

UNI_2002716

Scan Status:

In-progress

AI scoreUG Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/university-of-greenwich.jpeg
UG Higher Education
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreUG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/university-of-greenwich.jpeg
UG Higher Education
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

UG Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
University of GreenwichBreach8042/2016
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The personal details of hundreds of London-based research students of the University of Greenwich were compromised in a data breach incident in February 2016. The exposed information included Students' names, addresses, dates of birth, mobile phone numbers, and signatures. The university after knowing about the incident removed the documents and even contacted Google to try to ensure cached copies of the documents could not be retrieved from its search engine.

University of GreenwichBreach10056/2004
Rankiteo Explanation :
Attack threatening the organization's existence

Description: University of Greenwich suffered a security breach in which the personal data of 19,500 students that was uploaded on a microsite for a training conference in 2004,was leaked online. The exposed information included the names, addresses, dates of birth, phone numbers, and signatures, physical and mental health problems. The university investigated the attack and secured the data and notified the impacted students. However, it was fined £120,000 for data breach by the Information Commissioner.

University of Greenwich
Breach
Severity: 80
Impact: 4
Seen: 2/2016
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The personal details of hundreds of London-based research students of the University of Greenwich were compromised in a data breach incident in February 2016. The exposed information included Students' names, addresses, dates of birth, mobile phone numbers, and signatures. The university after knowing about the incident removed the documents and even contacted Google to try to ensure cached copies of the documents could not be retrieved from its search engine.

University of Greenwich
Breach
Severity: 100
Impact: 5
Seen: 6/2004
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: University of Greenwich suffered a security breach in which the personal data of 19,500 students that was uploaded on a microsite for a training conference in 2004,was leaked online. The exposed information included the names, addresses, dates of birth, phone numbers, and signatures, physical and mental health problems. The university investigated the attack and secured the data and notified the impacted students. However, it was fined £120,000 for data breach by the Information Commissioner.

Ailogo

UG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for UG

Incidents vs Higher Education Industry Average (This Year)

No incidents recorded for University of Greenwich in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for University of Greenwich in 2025.

Incident Types UG vs Higher Education Industry Avg (This Year)

No incidents recorded for University of Greenwich in 2025.

Incident History — UG (X = Date, Y = Severity)

UG cyber incidents detection timeline including parent company and subsidiaries

UG Company Subsidiaries

SubsidiaryImage

We are a multi-faculty university, which provides high-quality teaching, research and enterprise, and puts student satisfaction at the heart of our work. We welcome everyone who shares our passion for remaking the old and imagining the new. Our university community includes staff, students and other stakeholders in the UK and around the world. With subjects ranging from accountancy to science, we are proud of our excellent standards of teaching. We are based on three attractive, historic campuses in London and Medway, Kent, at the centre of an international network of partners and clients. The university is home to a diverse community of nearly 28,000 students studying in the UK and overseas, one in five of them postgraduate.

Loading...
similarCompanies

UG Similar Companies

University of Missouri System

The University of Missouri System has provided teaching, research and service to Missouri and the nation since 1839. The university was the first publicly supported institution of higher education established in the Louisiana Purchase territory. Its philosophy of education was shaped in accordance

University of Minnesota

One of the nation’s largest schools, the University of Minnesota offers baccalaureate, master’s, and doctoral degrees in virtually every field—from medicine to business, law to liberal arts, and science and engineering to architecture. The University of Minnesota system is made up of five campuses

University of Nebraska System

This is the official LinkedIn page of the the University of Nebraska System, the state of Nebraska's only public university. The NU System is comprised of four campuses: the University of Nebraska-Lincoln, the University of Nebraska at Omaha, the University of Nebraska Medical Center, and the Univer

Yale University

For more than 300 years, Yale University has inspired the minds that inspire the world. Based in New Haven, Connecticut, Yale brings people and ideas together for positive impact around the globe. A research university that focuses on students and encourages learning as an essential way of life, Yal

University of Arizona

The University of Arizona is the leading public research university in the American Southwest and Arizona's only member of the prestigious Association of American Universities. As the state's land-grant university, our research and resources enrich communities around the state and worldwide. Named #

Northeastern University

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opp

Clemson University

For over 130 years, Clemson University has shown unwavering dedication to the people of South Carolina. The University was founded with a land-grant mission and innovative vision — to increase the material resources of the State as a high seminary of learning. Since that time, the University has gro

University of Ottawa

À l’Université d’Ottawa, la plus grande université bilingue au monde, la population étudiante peut choisir d’étudier en français, en anglais, ou dans les deux langues. Située au cœur de la capitale du Canada, pays du G8, notre université jouit d’un accès direct aux plus grandes institutions du pays.

University of Alabama at Birmingham

Known for its innovative and interdisciplinary approach to education at both the graduate and undergraduate levels, the University of Alabama at Birmingham, a part of the University of Alabama System, is an internationally renowned research university and academic medical center with over $700 milli

newsone

UG CyberSecurity News

October 23, 2025 07:00 AM
How safe are digital ID cards from hackers?

The controversial digital ID has left many ready to reach for a Nokia brick phone over cybersecurity concerns, so what are the risks?

October 16, 2025 07:00 AM
Threat Actors Exploit Cisco SNMP Vulnerability To Install Linux Rootkits

August 11, 2025 07:00 AM
University of Western Australia suffers major data breach, staff and students locked out

The University of Western Australia is investigating a cyber attack that exposed thousands of staff and student passwords.

July 21, 2025 07:00 AM
List of Women Owned Cybersecurity Companies In The U.S. And Internationally

Steve Morgan, Editor-in-Chief. Sausalito, Calif. – Mar. 6, 2025. Cybercrime Magazine is excited to bring our readers a list of women-owned...

July 11, 2025 07:00 AM
VCI Global Appoints Cybersecurity Leader

Appointment reinforces VCI Global's commitment to building secure, high-trust AI infrastructure and unlocking long-term shareholder value.

July 10, 2025 07:00 AM
VCI Global Appoints Award-Winning Cybersecurity Leader Jane Teh as Chief AI Security Officer

Appointment reinforces VCI Global's commitment to building secure, high-trust AI infrastructure and unlocking long-term shareholder...

June 18, 2025 07:00 AM
CYBERSECURITY INCIDENT RESPONSE: CONCRETE ACTIONS NEEDED

Hanoi (VNA) – As Vietnam's digital transformation accelerates, both the frequency and severity of cyberattacks are growing.

May 19, 2025 06:40 AM
Top Tips for Staff: help your staff keep your organisation safe online

Online introductory cyber security training from UK government for the staff of SMEs, charities and voluntary organisations to help keep them safe online.

May 15, 2025 07:00 AM
Thousands of UK companies 'could have M&S-style hackers waiting in their systems'

"They're sitting in your network, waiting to the point where they can attack," a cybersecurity expert tells Sky News.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

UG CyberSecurity History Information

Official Website of University of Greenwich

The official website of University of Greenwich is http://greenwich.ac.uk.

University of Greenwich’s AI-Generated Cybersecurity Score

According to Rankiteo, University of Greenwich’s AI-generated cybersecurity score is 768, reflecting their Fair security posture.

How many security badges does University of Greenwich’ have ?

According to Rankiteo, University of Greenwich currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does University of Greenwich have SOC 2 Type 1 certification ?

According to Rankiteo, University of Greenwich is not certified under SOC 2 Type 1.

Does University of Greenwich have SOC 2 Type 2 certification ?

According to Rankiteo, University of Greenwich does not hold a SOC 2 Type 2 certification.

Does University of Greenwich comply with GDPR ?

According to Rankiteo, University of Greenwich is not listed as GDPR compliant.

Does University of Greenwich have PCI DSS certification ?

According to Rankiteo, University of Greenwich does not currently maintain PCI DSS compliance.

Does University of Greenwich comply with HIPAA ?

According to Rankiteo, University of Greenwich is not compliant with HIPAA regulations.

Does University of Greenwich have ISO 27001 certification ?

According to Rankiteo,University of Greenwich is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of University of Greenwich

University of Greenwich operates primarily in the Higher Education industry.

Number of Employees at University of Greenwich

University of Greenwich employs approximately 5,113 people worldwide.

Subsidiaries Owned by University of Greenwich

University of Greenwich presently has no subsidiaries across any sectors.

University of Greenwich’s LinkedIn Followers

University of Greenwich’s official LinkedIn profile has approximately 206,594 followers.

NAICS Classification of University of Greenwich

University of Greenwich is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.

University of Greenwich’s Presence on Crunchbase

No, University of Greenwich does not have a profile on Crunchbase.

University of Greenwich’s Presence on LinkedIn

Yes, University of Greenwich maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/university-of-greenwich.

Cybersecurity Incidents Involving University of Greenwich

As of November 30, 2025, Rankiteo reports that University of Greenwich has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

University of Greenwich has an estimated 14,151 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at University of Greenwich ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does University of Greenwich detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with secured the data and notified the impacted students, and containment measures with removed the documents, containment measures with contacted google to ensure cached copies could not be retrieved from its search engine..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: University of Greenwich Data Breach

Description: University of Greenwich suffered a security breach in which the personal data of 19,500 students that was uploaded on a microsite for a training conference in 2004, was leaked online.

Type: Data Breach

Incident : Data Breach

Title: University of Greenwich Data Breach

Description: The personal details of hundreds of London-based research students of the University of Greenwich were compromised in a data breach incident.

Date Detected: February 2016

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach UNI23114522

Data Compromised: Names, Addresses, Dates of birth, Phone numbers, Signatures, Physical and mental health problems

Legal Liabilities: Fined £120,000 by the Information Commissioner

Incident : Data Breach UNI33615522

Data Compromised: Students' names, Addresses, Dates of birth, Mobile phone numbers, Signatures

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Dates Of Birth, Phone Numbers, Signatures, Physical And Mental Health Problems, , Personal Information and .

Which entities were affected by each incident ?

Incident : Data Breach UNI23114522

Entity Name: University of Greenwich

Entity Type: Educational Institution

Industry: Education

Location: Greenwich, UK

Customers Affected: 19500

Incident : Data Breach UNI33615522

Entity Name: University of Greenwich

Entity Type: Educational Institution

Industry: Education

Location: London

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach UNI23114522

Remediation Measures: Secured the data and notified the impacted students

Incident : Data Breach UNI33615522

Containment Measures: Removed the documentsContacted Google to ensure cached copies could not be retrieved from its search engine

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach UNI23114522

Type of Data Compromised: Names, Addresses, Dates of birth, Phone numbers, Signatures, Physical and mental health problems

Number of Records Exposed: 19500

Sensitivity of Data: High

Incident : Data Breach UNI33615522

Type of Data Compromised: Personal information

Personally Identifiable Information: Namesaddressesdates of birthmobile phone numberssignatures

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Secured the data and notified the impacted students.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by removed the documents, contacted google to ensure cached copies could not be retrieved from its search engine and .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach UNI23114522

Fines Imposed: £120,000

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on February 2016.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, dates of birth, phone numbers, signatures, physical and mental health problems, , Students' names, addresses, dates of birth, mobile phone numbers, signatures and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Removed the documentsContacted Google to ensure cached copies could not be retrieved from its search engine.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, phone numbers, dates of birth, mobile phone numbers, signatures, Students' names, physical and mental health problems and addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 195.0.

Regulatory Compliance

What was the highest fine imposed for a regulatory violation ?

Highest Fine Imposed: The highest fine imposed for a regulatory violation was £120,000.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=university-of-greenwich' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge