Comparison Overview

U.S. Department of Health and Human Services (HHS)

VS

United States Postal Service

U.S. Department of Health and Human Services (HHS)

200 Independence Avenue S.W., Washington, District of Columbia, 20201, US
Last Update: 2025-12-11
Between 700 and 749

The Department of Health and Human Services (HHS) is the United States government's principal agency for protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves.

NAICS: 92
NAICS Definition: Public Administration
Employees: 11,887
Subsidiaries: 17
12-month incidents
0
Known data breaches
1
Attack type number
3

United States Postal Service

475 L’Enfant Plaza, S.W., Washington, D.C., 20260, US
Last Update: 2025-12-11
Between 700 and 749

As the United States Postal Service continues its evolution as a forward-thinking, fast-acting company capable of providing quality products and services for its customers, it continues to remember and celebrate its roots as the first national network of communications that literally bound a nation together. Ours is a proud heritage built on a simple yet profound mission: Bind the nation together. Connect every American, every door, every business, everywhere through the simple act of delivering mail and packages. This idea of universal service is at the heart of the $1.4 trillion industry that employs more than 7.5 million people and drives commerce, plays an integral part in every American community and remains the greatest value of any post in the world. The Postal Service delivers more mail to more addresses in a larger geographical area than any other post in the world. The Postal Service delivers to more than 157 million addresses in every state, city and town in this country. Everyone living in the United States and its territories has access to postal products and services and pays the same postage regardless of their location. The Postal Service receives no tax dollars for operating expenses and relies on the sale of postage, products and services to fund its operations. Facebook: www.facebook.com/usps Twitter: www.twitter.com/usps Instagram: www.instagram.com/uspostalservice Pinterest: www.pinterest.com/uspsstamps YouTube: www.youtube.com/usps Corporate Blog: www.uspsblog.com This profile, while affiliated with the U.S. Postal Service®, is not an official customer service page. Please use one of the methods described below to receive assistance. Get help on twitter @USPSHelp or call 800-275-8777or go to go.usa.gov/help Thank you

NAICS: 92
NAICS Definition: Public Administration
Employees: 142,734
Subsidiaries: 1
12-month incidents
1
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/us-department-of-health-and-human-services.jpeg
U.S. Department of Health and Human Services (HHS)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/usps.jpeg
United States Postal Service
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
U.S. Department of Health and Human Services (HHS)
100%
Compliance Rate
0/4 Standards Verified
United States Postal Service
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for U.S. Department of Health and Human Services (HHS) in 2025.

Incidents vs Government Administration Industry Average (This Year)

United States Postal Service has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — U.S. Department of Health and Human Services (HHS) (X = Date, Y = Severity)

U.S. Department of Health and Human Services (HHS) cyber incidents detection timeline including parent company and subsidiaries

Incident History — United States Postal Service (X = Date, Y = Severity)

United States Postal Service cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/us-department-of-health-and-human-services.jpeg
U.S. Department of Health and Human Services (HHS)
Incidents

Date Detected: 6/2025
Type:Ransomware
Attack Vector: Spearphishing campaigns, Remote Monitoring & Management software exploitation, Multifactor authentication bombing, SIM swapping techniques
Motivation: Financial gain
Blog: Blog

Date Detected: 12/2023
Type:Breach
Attack Vector: Network Infiltration
Blog: Blog

Date Detected: 07/2023
Type:Data Leak
Blog: Blog
https://images.rankiteo.com/companyimages/usps.jpeg
United States Postal Service
Incidents

Date Detected: 5/2025
Type:Breach
Blog: Blog

Date Detected: 8/2024
Type:Breach
Attack Vector: Social Engineering
Motivation: Financial Fraud
Blog: Blog

FAQ

U.S. Department of Health and Human Services (HHS) company demonstrates a stronger AI Cybersecurity Score compared to United States Postal Service company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

U.S. Department of Health and Human Services (HHS) company has faced a higher number of disclosed cyber incidents historically compared to United States Postal Service company.

In the current year, United States Postal Service and U.S. Department of Health and Human Services (HHS) have reported a similar number of cyber incidents.

U.S. Department of Health and Human Services (HHS) company has confirmed experiencing a ransomware attack, while United States Postal Service company has not reported such incidents publicly.

Both United States Postal Service company and U.S. Department of Health and Human Services (HHS) company have disclosed experiencing at least one data breach.

Neither United States Postal Service company nor U.S. Department of Health and Human Services (HHS) company has reported experiencing targeted cyberattacks publicly.

Neither U.S. Department of Health and Human Services (HHS) company nor United States Postal Service company has reported experiencing or disclosing vulnerabilities publicly.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds any compliance certifications.

Neither company holds any compliance certifications.

U.S. Department of Health and Human Services (HHS) company has more subsidiaries worldwide compared to United States Postal Service company.

United States Postal Service company employs more people globally than U.S. Department of Health and Human Services (HHS) company, reflecting its scale as a Government Administration.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds SOC 2 Type 1 certification.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds SOC 2 Type 2 certification.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds ISO 27001 certification.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds PCI DSS certification.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds HIPAA certification.

Neither U.S. Department of Health and Human Services (HHS) nor United States Postal Service holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X