Company Details
uticanational
1,358
25,892
524
uticanational.com
0
UTI_5745860
In-progress

Utica National Insurance Group Company CyberSecurity Posture
uticanational.comUtica National Insurance Group is a Top 100, nationally recognized insurer providing personal and commercial insurance products and services, with the second-largest errors and omissions business in the United States. Utica National sells its products through more than 2,200 independent insurance agents and employs over 1,200 people countrywide. The company was founded in 1914 and is headquartered in New Hartford, New York, with seven regional offices. Utica Mutual Insurance Company and its affiliated companies, New Hartford, NY.
Company Details
uticanational
1,358
25,892
524
uticanational.com
0
UTI_5745860
In-progress
Between 700 and 749

UNIG Global Score (TPRM)XXXX

Description: Utica, New York-based Kelberman Center suffered a breach that impacted 3,501 individuals. The company detected suspicious activity within one user’s email inbox and the investigation revealed that an unauthorized party potentially accessed a limited number of Kelberman mailboxes between October 31 and November 3, 2022. The accessed files contained protected health information, including names, dates of birth, diagnosis and treatment information, and provider information.


No incidents recorded for Utica National Insurance Group in 2025.
No incidents recorded for Utica National Insurance Group in 2025.
No incidents recorded for Utica National Insurance Group in 2025.
UNIG cyber incidents detection timeline including parent company and subsidiaries

Utica National Insurance Group is a Top 100, nationally recognized insurer providing personal and commercial insurance products and services, with the second-largest errors and omissions business in the United States. Utica National sells its products through more than 2,200 independent insurance agents and employs over 1,200 people countrywide. The company was founded in 1914 and is headquartered in New Hartford, New York, with seven regional offices. Utica Mutual Insurance Company and its affiliated companies, New Hartford, NY.


Blue Cross Blue Shield of Michigan is a nonprofit corporation and an independent licensee of the Blue Cross and Blue Shield Association. BCBSM's commitment to Michigan is what differentiates it from other health insurance companies doing business in the state. That mission has never changed. Nea

For more than 90 years, American Family Insurance has built its reputation on sound principles. We strive to provide you industry-leading service, exceptional claims experience and products that build long-term relationships. This is accomplished by treating policyholders fairly in a helpful and car

Over 50 Million people worldwide have chosen Aflac because of our commitment to providing customers with the confidence that comes from knowing they have assistance in being prepared for whatever life may bring. With Aflac, whether you're a large business or a small one, you can provide your emplo

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Pr

GEICO (Government Employees Insurance Company) offers a variety of insurance such as vehicle, property, business, life, umbrella, travel, pet, jewelry and more. The company, which was founded in 1936, is the third-largest auto insurer in the United States and insures vehicles in all 50 states an

Talanx is one of the major European insurance groups. Under the HDI brand it operates both in Germany and abroad in industrial insurance as well as retail business. Further Group brands include Hannover Re, one of the world’s leading reinsurers, Targo insurers, LifeStyle Protection and neue leben, t

Listening. Understanding. Delivering. At Prudential Indonesia we deliver excellence by consistently innovating, creating new opportunities and growing our business to cater all of our customers' needs. With a vision of becoming truly world class, Prudential Indonesia provides quality services and
We help our clients and colleagues grow — and our communities thrive — by protecting and promoting Possibility. We seek better ways to manage risk and define more effective paths to the right outcome. We go beyond risk to rewards for our clients, our company, our colleagues, and the communities in w

What makes Lockton stand apart is also what makes us better: independence. Our private ownership empowers our 13,100+ Associates doing business in over 140+ countries to focus solely on clients' risk and insurance needs. With expertise that reaches around the globe, we deliver the deep understanding
.png)
A Catholic school in Morristown, N.J., is suing its insurer for refusing to settle litigation brought by a former student who alleged they...
OLDWICK, N.J., July 17, 2025--AM Best has downgraded the Financial Strength Rating to A- (Excellent) from A (Excellent) and the Long-Term...
Utica National Insurance Group continues to build on its reputable success, with goals to continue improving its financial strength rating in 2025.
Let us list out the victims who have been impacted by the attack after the hack-ers gained control of Moveit file transfer software worldwide.
The group of property/casualty insurers offering auto insurance premium discounts to recognize that insureds are driving less during the...
Everest Insurance announced it has joined with All Risks, Ltd. to expand their workers' compensation capabilities for the marine industry.
Specialty underwriter and program administrator Business Risk Partners (BRP), headquartered in Windsor, Conn., has added two new members to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Utica National Insurance Group is https://www.uticanational.com.
According to Rankiteo, Utica National Insurance Group’s AI-generated cybersecurity score is 721, reflecting their Moderate security posture.
According to Rankiteo, Utica National Insurance Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Utica National Insurance Group is not certified under SOC 2 Type 1.
According to Rankiteo, Utica National Insurance Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Utica National Insurance Group is not listed as GDPR compliant.
According to Rankiteo, Utica National Insurance Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Utica National Insurance Group is not compliant with HIPAA regulations.
According to Rankiteo,Utica National Insurance Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Utica National Insurance Group operates primarily in the Insurance industry.
Utica National Insurance Group employs approximately 1,358 people worldwide.
Utica National Insurance Group presently has no subsidiaries across any sectors.
Utica National Insurance Group’s official LinkedIn profile has approximately 25,892 followers.
Utica National Insurance Group is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.
No, Utica National Insurance Group does not have a profile on Crunchbase.
Yes, Utica National Insurance Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/uticanational.
As of December 16, 2025, Rankiteo reports that Utica National Insurance Group has experienced 1 cybersecurity incidents.
Utica National Insurance Group has an estimated 15,075 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Kelberman Center Email Breach
Description: Kelberman Center suffered a breach that impacted 3,501 individuals. The company detected suspicious activity within one user’s email inbox and the investigation revealed that an unauthorized party potentially accessed a limited number of Kelberman mailboxes between October 31 and November 3, 2022. The accessed files contained protected health information, including names, dates of birth, diagnosis and treatment information, and provider information.
Date Detected: 2022-11-03
Type: Data Breach
Attack Vector: Email Compromise
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email.

Data Compromised: Names, Dates of birth, Diagnosis and treatment information, Provider information
Systems Affected: Email
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information and .

Entity Name: Kelberman Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Utica, New York
Customers Affected: 3501

Type of Data Compromised: Protected health information
Number of Records Exposed: 3501
Sensitivity of Data: High
Personally Identifiable Information: NamesDates of Birth

Entry Point: Email
Most Recent Incident Detected: The most recent incident detected was on 2022-11-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Diagnosis and Treatment Information, Provider Information and .
Most Significant System Affected: The most significant system affected in an incident was Email.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Provider Information, Diagnosis and Treatment Information and Dates of Birth.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 351.0.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.