Company Details
uscitservices
111
3,214
5415
usc.edu
0
USC_2449806
In-progress

USC Information Technology Services (ITS) Company CyberSecurity Posture
usc.eduBringing together a team of diverse and talented professionals, we provide the central IT services that support USC's schools, hospitals, research centers, and administrative units. Through the digital transformation initiatives we recently launched, we aim to develop an environment of continuous service improvement, founded on cross-functional teamwork, industry best practices, innovation, and a commitment to the customer experience.
Company Details
uscitservices
111
3,214
5415
usc.edu
0
USC_2449806
In-progress
Between 700 and 749

UITS Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that the University of Southern California experienced a data breach on September 28, 2021, due to the loss of an external hard drive by a professor. The breach potentially affected personal information including student academic information, with notifications being sent out on May 5, 2022. The total number of affected individuals is unknown.


No incidents recorded for USC Information Technology Services (ITS) in 2025.
No incidents recorded for USC Information Technology Services (ITS) in 2025.
No incidents recorded for USC Information Technology Services (ITS) in 2025.
UITS cyber incidents detection timeline including parent company and subsidiaries

Bringing together a team of diverse and talented professionals, we provide the central IT services that support USC's schools, hospitals, research centers, and administrative units. Through the digital transformation initiatives we recently launched, we aim to develop an environment of continuous service improvement, founded on cross-functional teamwork, industry best practices, innovation, and a commitment to the customer experience.


We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that

Somos a Algar Tech CX. Com 26 anos de mercado, atuamos como parceira de negócio para a transformação digital de grandes corporações. Nosso portfólio possui serviços de Relacionamento com o Cliente, que visam melhorar a experiência dos consumidores. Somos mais de 7 mil associados que trabalham com o
At Avaya, we give our customers the freedom to take their business in the directions that benefit them most. We provide the paths for both customers and their employees where every moment big and small can drive in the moment, memorable experiences. The journey is theirs at the pace that makes sense

Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services -- now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure e
TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achiev

HCLTech is a global technology company, home to more than 220,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products. We work with clients across all major verticals

HUAWEI CLOUD now distills 30+ years of accumulated technology, innovation, and expertise in the ICT infrastructure field to offer customers everything as a service. You can grow your enterprise in the best environment with stable, secure, and ever-improving HUAWEI CLOUD services and affordable, incl

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg
.png)
Section 3553(h) of title 44, U.S. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected...
Where should you earn your master's in computer science online? Discover the 10 U.S. schools with the best online master's degrees in...
Students at USC Upstate connected with local employers at the final Date with Data of the Fall 2025 semester.
This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency's Emergency Directive 25-03: Identify and...
The annual event convened students, faculty and industry leaders to explore emerging challenges and identify solutions for securing the aerospace ecosystem.
Explore pathways to secure a tech job in Columbia, South Carolina in 2025. Discover job opportunities, education, and community resources.
Strengthening the agency will require answering critically important questions regarding how CMS should be organized and what human capital...
USC is launching the Institute on Ethics & Trust in Computing, where experts will offer ethical guidance and resources to students and researchers.
A fifth-grade workshop and encouraging parents set this USC computer science student-and 2025 commencement flag-bearer-on a path to engineering, ethics, and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of USC Information Technology Services (ITS) is https://itservices.usc.edu/.
According to Rankiteo, USC Information Technology Services (ITS)’s AI-generated cybersecurity score is 729, reflecting their Moderate security posture.
According to Rankiteo, USC Information Technology Services (ITS) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, USC Information Technology Services (ITS) is not certified under SOC 2 Type 1.
According to Rankiteo, USC Information Technology Services (ITS) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, USC Information Technology Services (ITS) is not listed as GDPR compliant.
According to Rankiteo, USC Information Technology Services (ITS) does not currently maintain PCI DSS compliance.
According to Rankiteo, USC Information Technology Services (ITS) is not compliant with HIPAA regulations.
According to Rankiteo,USC Information Technology Services (ITS) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
USC Information Technology Services (ITS) operates primarily in the IT Services and IT Consulting industry.
USC Information Technology Services (ITS) employs approximately 111 people worldwide.
USC Information Technology Services (ITS) presently has no subsidiaries across any sectors.
USC Information Technology Services (ITS)’s official LinkedIn profile has approximately 3,214 followers.
USC Information Technology Services (ITS) is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, USC Information Technology Services (ITS) does not have a profile on Crunchbase.
Yes, USC Information Technology Services (ITS) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/uscitservices.
As of November 27, 2025, Rankiteo reports that USC Information Technology Services (ITS) has experienced 1 cybersecurity incidents.
USC Information Technology Services (ITS) has an estimated 36,305 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: University of Southern California Data Breach
Description: The University of Southern California experienced a data breach due to the loss of an external hard drive by a professor, potentially affecting personal information including student academic information.
Date Detected: 2021-09-28
Date Publicly Disclosed: 2022-05-05
Type: Data Breach
Attack Vector: Loss of External Hard Drive
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Student academic information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Student Academic Information and .

Entity Name: University of Southern California
Entity Type: Educational Institution
Industry: Education
Location: California, USA

Type of Data Compromised: Student academic information

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.
Most Recent Incident Detected: The most recent incident detected was on 2021-09-28.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-05-05.
Most Significant Data Compromised: The most significant data compromised in an incident were Student Academic Information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Student Academic Information.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.