ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Bringing together a team of diverse and talented professionals, we provide the central IT services that support USC's schools, hospitals, research centers, and administrative units. Through the digital transformation initiatives we recently launched, we aim to develop an environment of continuous service improvement, founded on cross-functional teamwork, industry best practices, innovation, and a commitment to the customer experience. 

USC Information Technology Services (ITS) A.I CyberSecurity Scoring

UITS

Company Details

Linkedin ID:

uscitservices

Employees number:

111

Number of followers:

3,214

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

usc.edu

IP Addresses:

0

Company ID:

USC_2449806

Scan Status:

In-progress

AI scoreUITS Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/uscitservices.jpeg
UITS IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreUITS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/uscitservices.jpeg
UITS IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

UITS Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
University of Southern CaliforniaBreach2519/2021
Rankiteo Explanation :
Attack without any consequences

Description: The California Office of the Attorney General reported that the University of Southern California experienced a data breach on September 28, 2021, due to the loss of an external hard drive by a professor. The breach potentially affected personal information including student academic information, with notifications being sent out on May 5, 2022. The total number of affected individuals is unknown.

University of Southern California
Breach
Severity: 25
Impact: 1
Seen: 9/2021
Blog:
Rankiteo Explanation
Attack without any consequences

Description: The California Office of the Attorney General reported that the University of Southern California experienced a data breach on September 28, 2021, due to the loss of an external hard drive by a professor. The breach potentially affected personal information including student academic information, with notifications being sent out on May 5, 2022. The total number of affected individuals is unknown.

Ailogo

UITS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for UITS

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for USC Information Technology Services (ITS) in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for USC Information Technology Services (ITS) in 2025.

Incident Types UITS vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for USC Information Technology Services (ITS) in 2025.

Incident History — UITS (X = Date, Y = Severity)

UITS cyber incidents detection timeline including parent company and subsidiaries

UITS Company Subsidiaries

SubsidiaryImage

Bringing together a team of diverse and talented professionals, we provide the central IT services that support USC's schools, hospitals, research centers, and administrative units. Through the digital transformation initiatives we recently launched, we aim to develop an environment of continuous service improvement, founded on cross-functional teamwork, industry best practices, innovation, and a commitment to the customer experience. 

Loading...
similarCompanies

UITS Similar Companies

Serco

We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,

TD SYNNEX

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that

Algar Tech

Somos a Algar Tech CX. Com 26 anos de mercado, atuamos como parceira de negócio para a transformação digital de grandes corporações. Nosso portfólio possui serviços de Relacionamento com o Cliente, que visam melhorar a experiência dos consumidores. Somos mais de 7 mil associados que trabalham com o

At Avaya, we give our customers the freedom to take their business in the directions that benefit them most. We provide the paths for both customers and their employees where every moment big and small can drive in the moment, memorable experiences. The journey is theirs at the pace that makes sense

Amazon Web Services (AWS)

Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services -- now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure e

TransUnion

TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achiev

HCLTech

HCLTech is a global technology company, home to more than 220,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products. We work with clients across all major verticals

Common Market For Eastern And Southern Africa

HUAWEI CLOUD now distills 30+ years of accumulated technology, innovation, and expertise in the ICT infrastructure field to offer customers everything as a service. You can grow your enterprise in the best environment with stable, secure, and ever-improving HUAWEI CLOUD services and affordable, incl

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg

newsone

UITS CyberSecurity News

October 15, 2025 07:00 AM
ED 26-01: Mitigate Vulnerabilities in F5 Devices

Section 3553(h) of title 44, U.S. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected...

September 26, 2025 07:00 AM
Best Master’s in Computer Science Online Of 2025

Where should you earn your master's in computer science online? Discover the 10 U.S. schools with the best online master's degrees in...

September 26, 2025 07:00 AM
Swiping Right on Opportunity at Date with Data

Students at USC Upstate connected with local employers at the final Date with Data of the Fall 2025 semester.

September 25, 2025 07:00 AM
ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices

This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency's Emergency Directive 25-03: Identify and...

July 01, 2025 07:00 AM
Workshop, Competitions Strengthen Embry-Riddle Cybersecurity Expertise

The annual event convened students, faculty and industry leaders to explore emerging challenges and identify solutions for securing the aerospace ecosystem.

June 13, 2025 07:00 AM
Getting a Job in Tech in Columbia in 2025: The Complete Guide

Explore pathways to secure a tech job in Columbia, South Carolina in 2025. Discover job opportunities, education, and community resources.

June 02, 2025 07:00 AM
A Vision for Rebuilding CMS

Strengthening the agency will require answering critically important questions regarding how CMS should be organized and what human capital...

May 29, 2025 07:00 AM
USC launches $12 million Institute on Ethics & Trust in Computing

USC is launching the Institute on Ethics & Trust in Computing, where experts will offer ethical guidance and resources to students and researchers.

May 13, 2025 07:00 AM
From Scratch to Cybersecurity: Lavanya Sharma’s USC Journey

A fifth-grade workshop and encouraging parents set this USC computer science student-and 2025 commencement flag-bearer-on a path to engineering, ethics, and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

UITS CyberSecurity History Information

Official Website of USC Information Technology Services (ITS)

The official website of USC Information Technology Services (ITS) is https://itservices.usc.edu/.

USC Information Technology Services (ITS)’s AI-Generated Cybersecurity Score

According to Rankiteo, USC Information Technology Services (ITS)’s AI-generated cybersecurity score is 729, reflecting their Moderate security posture.

How many security badges does USC Information Technology Services (ITS)’ have ?

According to Rankiteo, USC Information Technology Services (ITS) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does USC Information Technology Services (ITS) have SOC 2 Type 1 certification ?

According to Rankiteo, USC Information Technology Services (ITS) is not certified under SOC 2 Type 1.

Does USC Information Technology Services (ITS) have SOC 2 Type 2 certification ?

According to Rankiteo, USC Information Technology Services (ITS) does not hold a SOC 2 Type 2 certification.

Does USC Information Technology Services (ITS) comply with GDPR ?

According to Rankiteo, USC Information Technology Services (ITS) is not listed as GDPR compliant.

Does USC Information Technology Services (ITS) have PCI DSS certification ?

According to Rankiteo, USC Information Technology Services (ITS) does not currently maintain PCI DSS compliance.

Does USC Information Technology Services (ITS) comply with HIPAA ?

According to Rankiteo, USC Information Technology Services (ITS) is not compliant with HIPAA regulations.

Does USC Information Technology Services (ITS) have ISO 27001 certification ?

According to Rankiteo,USC Information Technology Services (ITS) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of USC Information Technology Services (ITS)

USC Information Technology Services (ITS) operates primarily in the IT Services and IT Consulting industry.

Number of Employees at USC Information Technology Services (ITS)

USC Information Technology Services (ITS) employs approximately 111 people worldwide.

Subsidiaries Owned by USC Information Technology Services (ITS)

USC Information Technology Services (ITS) presently has no subsidiaries across any sectors.

USC Information Technology Services (ITS)’s LinkedIn Followers

USC Information Technology Services (ITS)’s official LinkedIn profile has approximately 3,214 followers.

NAICS Classification of USC Information Technology Services (ITS)

USC Information Technology Services (ITS) is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

USC Information Technology Services (ITS)’s Presence on Crunchbase

No, USC Information Technology Services (ITS) does not have a profile on Crunchbase.

USC Information Technology Services (ITS)’s Presence on LinkedIn

Yes, USC Information Technology Services (ITS) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/uscitservices.

Cybersecurity Incidents Involving USC Information Technology Services (ITS)

As of November 27, 2025, Rankiteo reports that USC Information Technology Services (ITS) has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

USC Information Technology Services (ITS) has an estimated 36,305 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at USC Information Technology Services (ITS) ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: University of Southern California Data Breach

Description: The University of Southern California experienced a data breach due to the loss of an external hard drive by a professor, potentially affecting personal information including student academic information.

Date Detected: 2021-09-28

Date Publicly Disclosed: 2022-05-05

Type: Data Breach

Attack Vector: Loss of External Hard Drive

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach USC117072825

Data Compromised: Student academic information

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Student Academic Information and .

Which entities were affected by each incident ?

Incident : Data Breach USC117072825

Entity Name: University of Southern California

Entity Type: Educational Institution

Industry: Education

Location: California, USA

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach USC117072825

Type of Data Compromised: Student academic information

References

Where can I find more information about each incident ?

Incident : Data Breach USC117072825

Source: California Office of the Attorney General

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2021-09-28.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-05-05.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Student Academic Information and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Student Academic Information.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=uscitservices' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge