Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

VisionPoint Eye Center was established in 2019 after the merger of four well-established eye care practices in the Bloomington-Normal community. These practices and doctors shared the vision of serving their patients better by combining expert routine and specialized services in one, central eye care facility conveniently located at 1107 Airport Road, Bloomington, IL 61704

VisionPoint Eye Center LLC A.I CyberSecurity Scoring

VECL

Company Details

Linkedin ID:

visionpoint-eye-center-llc

Employees number:

33

Number of followers:

96

NAICS:

621

Industry Type:

Medical Practices

Homepage:

visionpointeye.com

IP Addresses:

0

Company ID:

VIS_2422080

Scan Status:

In-progress

AI scoreVECL Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/visionpoint-eye-center-llc.jpeg
VECL Medical Practices
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreVECL Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/visionpoint-eye-center-llc.jpeg
VECL Medical Practices
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

VECL Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
VisionPoint Eye Center LLCBreach85410/2024NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: VisionPoint Eye Center Reaches $750K Settlement Over 2024 Data Breach Affecting 67,000 Patients VisionPoint Eye Center, a central Illinois-based ophthalmology and optometry provider, has agreed to a $750,000 settlement to resolve class action litigation stemming from a data breach discovered in October 2024. The incident, which exposed the protected health information of 66,924 individuals, occurred after an unauthorized third party accessed the organization’s network on or around October 3, 2024. Compromised data included names, medical record numbers, health insurance details, and other sensitive medical information. The breach prompted five class action lawsuits, later consolidated into *Davis, et al. v. VisionPoint Eye Center* in the Illinois Circuit Court of the Eleventh Judicial Circuit. Plaintiffs alleged negligence, breach of fiduciary duty, and violations of the Illinois Consumer Fraud and Deceptive Business Practices Act, arguing that VisionPoint failed to implement adequate security measures. The healthcare provider denies all claims, citing the settlement as a cost-effective resolution amid litigation risks. Under the agreement, a $750,000 fund will cover legal fees, administrative costs, and compensation for affected individuals. Class members may claim two years of credit monitoring or opt for one of two cash benefits: reimbursement of documented breach-related losses (up to $2,500 per person) or a one-time payment expected to be $45, subject to pro rata adjustments based on claim volume. The settlement received preliminary court approval, with deadlines set for February 2, 2026 (opt-out/object) and March 3, 2026 (claim submissions). A final fairness hearing is scheduled for March 2, 2026. The breach was reported to the HHS’ Office for Civil Rights in compliance with federal regulations.

VisionPoint Eye Center: VisionPoint Eye Center Data Breach Victims Benefit from $750,000 Settlement
Breach
Severity: 85
Impact: 4
Seen: 10/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: VisionPoint Eye Center Reaches $750K Settlement Over 2024 Data Breach Affecting 67,000 Patients VisionPoint Eye Center, a central Illinois-based ophthalmology and optometry provider, has agreed to a $750,000 settlement to resolve class action litigation stemming from a data breach discovered in October 2024. The incident, which exposed the protected health information of 66,924 individuals, occurred after an unauthorized third party accessed the organization’s network on or around October 3, 2024. Compromised data included names, medical record numbers, health insurance details, and other sensitive medical information. The breach prompted five class action lawsuits, later consolidated into *Davis, et al. v. VisionPoint Eye Center* in the Illinois Circuit Court of the Eleventh Judicial Circuit. Plaintiffs alleged negligence, breach of fiduciary duty, and violations of the Illinois Consumer Fraud and Deceptive Business Practices Act, arguing that VisionPoint failed to implement adequate security measures. The healthcare provider denies all claims, citing the settlement as a cost-effective resolution amid litigation risks. Under the agreement, a $750,000 fund will cover legal fees, administrative costs, and compensation for affected individuals. Class members may claim two years of credit monitoring or opt for one of two cash benefits: reimbursement of documented breach-related losses (up to $2,500 per person) or a one-time payment expected to be $45, subject to pro rata adjustments based on claim volume. The settlement received preliminary court approval, with deadlines set for February 2, 2026 (opt-out/object) and March 3, 2026 (claim submissions). A final fairness hearing is scheduled for March 2, 2026. The breach was reported to the HHS’ Office for Civil Rights in compliance with federal regulations.

Ailogo

VECL Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for VECL

Incidents vs Medical Practices Industry Average (This Year)

No incidents recorded for VisionPoint Eye Center LLC in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for VisionPoint Eye Center LLC in 2026.

Incident Types VECL vs Medical Practices Industry Avg (This Year)

No incidents recorded for VisionPoint Eye Center LLC in 2026.

Incident History — VECL (X = Date, Y = Severity)

VECL cyber incidents detection timeline including parent company and subsidiaries

VECL Company Subsidiaries

SubsidiaryImage

VisionPoint Eye Center was established in 2019 after the merger of four well-established eye care practices in the Bloomington-Normal community. These practices and doctors shared the vision of serving their patients better by combining expert routine and specialized services in one, central eye care facility conveniently located at 1107 Airport Road, Bloomington, IL 61704

Loading...
similarCompanies

VECL Similar Companies

Hamad Medical Corporation

Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.

newsone

VECL CyberSecurity News

September 03, 2017 11:36 AM
HIPAA Breach News

Our HIPAA breach news section covers HIPAA breaches such as unauthorized disclosures of protected health information (PHI), improper disposal of PHI.

September 03, 2017 10:46 AM
Legal News about HIPAA Compliance

The HIPAA Journal legal news section contains details of the latest enforcement activities by the Department of Health and Human Services' Office for Civil...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

VECL CyberSecurity History Information

Official Website of VisionPoint Eye Center LLC

The official website of VisionPoint Eye Center LLC is http://www.visionpointeye.com.

VisionPoint Eye Center LLC’s AI-Generated Cybersecurity Score

According to Rankiteo, VisionPoint Eye Center LLC’s AI-generated cybersecurity score is 656, reflecting their Weak security posture.

How many security badges does VisionPoint Eye Center LLC’ have ?

According to Rankiteo, VisionPoint Eye Center LLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has VisionPoint Eye Center LLC been affected by any supply chain cyber incidents ?

According to Rankiteo, VisionPoint Eye Center LLC has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does VisionPoint Eye Center LLC have SOC 2 Type 1 certification ?

According to Rankiteo, VisionPoint Eye Center LLC is not certified under SOC 2 Type 1.

Does VisionPoint Eye Center LLC have SOC 2 Type 2 certification ?

According to Rankiteo, VisionPoint Eye Center LLC does not hold a SOC 2 Type 2 certification.

Does VisionPoint Eye Center LLC comply with GDPR ?

According to Rankiteo, VisionPoint Eye Center LLC is not listed as GDPR compliant.

Does VisionPoint Eye Center LLC have PCI DSS certification ?

According to Rankiteo, VisionPoint Eye Center LLC does not currently maintain PCI DSS compliance.

Does VisionPoint Eye Center LLC comply with HIPAA ?

According to Rankiteo, VisionPoint Eye Center LLC is not compliant with HIPAA regulations.

Does VisionPoint Eye Center LLC have ISO 27001 certification ?

According to Rankiteo,VisionPoint Eye Center LLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of VisionPoint Eye Center LLC

VisionPoint Eye Center LLC operates primarily in the Medical Practices industry.

Number of Employees at VisionPoint Eye Center LLC

VisionPoint Eye Center LLC employs approximately 33 people worldwide.

Subsidiaries Owned by VisionPoint Eye Center LLC

VisionPoint Eye Center LLC presently has no subsidiaries across any sectors.

VisionPoint Eye Center LLC’s LinkedIn Followers

VisionPoint Eye Center LLC’s official LinkedIn profile has approximately 96 followers.

NAICS Classification of VisionPoint Eye Center LLC

VisionPoint Eye Center LLC is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.

VisionPoint Eye Center LLC’s Presence on Crunchbase

No, VisionPoint Eye Center LLC does not have a profile on Crunchbase.

VisionPoint Eye Center LLC’s Presence on LinkedIn

Yes, VisionPoint Eye Center LLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/visionpoint-eye-center-llc.

Cybersecurity Incidents Involving VisionPoint Eye Center LLC

As of January 22, 2026, Rankiteo reports that VisionPoint Eye Center LLC has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

VisionPoint Eye Center LLC has an estimated 9,096 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at VisionPoint Eye Center LLC ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

What was the total financial impact of these incidents on VisionPoint Eye Center LLC ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $750 thousand.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: VisionPoint Eye Center Data Breach

Description: An unauthorized third party gained access to VisionPoint Eye Center's network and potentially stole files containing patient data, including names, medical record numbers, health insurance information, and medical information.

Date Detected: 2024-10-03

Type: Data Breach

Threat Actor: Unauthorized third party

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach VIS1766750067

Financial Loss: $750,000 settlement fund

Data Compromised: Names, medical record numbers, health insurance information, medical information

Systems Affected: Network

Legal Liabilities: Class action litigation

Identity Theft Risk: High

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $750.00 thousand.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information (PHI).

Which entities were affected by each incident ?

Incident : Data Breach VIS1766750067

Entity Name: VisionPoint Eye Center

Entity Type: Healthcare Provider

Industry: Ophthalmology and Optometry

Location: Central Illinois

Customers Affected: 66,924 individuals

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach VIS1766750067

Type of Data Compromised: Protected Health Information (PHI)

Number of Records Exposed: 66,924

Sensitivity of Data: High

Data Exfiltration: Potential

Personally Identifiable Information: Names, medical record numbers, health insurance information

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach VIS1766750067

Regulations Violated: HIPAA

Legal Actions: Class action lawsuit (Davis, et al. v. VisionPoint Eye Center)

Regulatory Notifications: Reported to HHS’ Office for Civil Rights

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuit (Davis, et al. v. VisionPoint Eye Center).

References

Where can I find more information about each incident ?

Incident : Data Breach VIS1766750067

Source: HIPAA Journal

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: HIPAA Journal.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach VIS1766750067

Investigation Status: Settlement agreed

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach VIS1766750067

Customer Advisories: Class members may claim credit monitoring services or cash benefits

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Class members may claim credit monitoring services or cash benefits.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach VIS1766750067

Root Causes: Inadequate security measures and non-adherence to industry-standard security best practices

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-10-03.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was $750,000 settlement fund.

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, medical record numbers, health insurance information and medical information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, medical record numbers, health insurance information and medical information.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 66.9K.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuit (Davis, et al. v. VisionPoint Eye Center).

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is HIPAA Journal.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Settlement agreed.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Class members may claim credit monitoring services or cash benefits.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=visionpoint-eye-center-llc' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge