Comparison Overview

World Health Organization

VS

USAID

World Health Organization

20, avenue Appia, Geneva 27, GE, CH, 1211
Last Update: 2025-12-09
Between 800 and 849

The World Health Organization's mission: to promote health, keep the world safe, and serve the vulnerable. Working through offices in more than 150 countries, WHO staff work side by side with governments and other partners to ensure the highest attainable level of health for all people. Stay connected with WHO: Facebook https://www.facebook.com/WHO Twitter http://www.twitter.com/who Instagram: @who Google+ https://www.google.com/+who YouTube http://www.youtube.com/who

NAICS: 92812
NAICS Definition: International Affairs
Employees: 30,615
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
2

USAID

1300 Pennsylvania Ave NW, None, Washington, District of Columbia, US, 20004
Last Update: 2025-12-11
Between 750 and 799

USAID is the lead U.S. Government agency that works to end extreme global poverty and enable resilient, democratic societies to realize their potential. U.S. foreign assistance has always had the twofold purpose of furthering America's interests while improving lives in the developing world. USAID carries out U.S. foreign policy by promoting broad-scale human progress at the same time it expands stable, free societies, creates markets and trade partners for the United States, and fosters good will abroad. Spending less than 1 percent of the total federal budget, USAID works in over 100 countries to: -Promote broadly shared economic prosperity; -Strengthen democracy and good governance; -Protect human rights; -Improve global health, -Advance food security and agriculture; -Improve environmental sustainability; -Further education; -Help societies prevent and recover from conflicts; and -Provide humanitarian assistance in the wake of natural and man-made disasters. Privacy Policy: http://www.usaid.gov/privacy-policy

NAICS: 92812
NAICS Definition: International Affairs
Employees: 17,787
Subsidiaries: 1
12-month incidents
1
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/world-health-organization.jpeg
World Health Organization
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/usaid.jpeg
USAID
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
World Health Organization
100%
Compliance Rate
0/4 Standards Verified
USAID
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs International Affairs Industry Average (This Year)

No incidents recorded for World Health Organization in 2025.

Incidents vs International Affairs Industry Average (This Year)

USAID has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incident History — World Health Organization (X = Date, Y = Severity)

World Health Organization cyber incidents detection timeline including parent company and subsidiaries

Incident History — USAID (X = Date, Y = Severity)

USAID cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/world-health-organization.jpeg
World Health Organization
Incidents

Date Detected: 3/2020
Type:Cyber Attack
Attack Vector: Phishing
Blog: Blog

Date Detected: 6/2018
Type:Ransomware
Attack Vector: Initial Access
Motivation: Financial Gain, Data Theft
Blog: Blog
https://images.rankiteo.com/companyimages/usaid.jpeg
USAID
Incidents

Date Detected: 2/2025
Type:Breach
Blog: Blog

FAQ

World Health Organization company demonstrates a stronger AI Cybersecurity Score compared to USAID company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

World Health Organization company has faced a higher number of disclosed cyber incidents historically compared to USAID company.

In the current year, USAID company has reported more cyber incidents than World Health Organization company.

World Health Organization company has confirmed experiencing a ransomware attack, while USAID company has not reported such incidents publicly.

USAID company has disclosed at least one data breach, while World Health Organization company has not reported such incidents publicly.

World Health Organization company has reported targeted cyberattacks, while USAID company has not reported such incidents publicly.

Neither World Health Organization company nor USAID company has reported experiencing or disclosing vulnerabilities publicly.

Neither World Health Organization nor USAID holds any compliance certifications.

Neither company holds any compliance certifications.

USAID company has more subsidiaries worldwide compared to World Health Organization company.

World Health Organization company employs more people globally than USAID company, reflecting its scale as a International Affairs.

Neither World Health Organization nor USAID holds SOC 2 Type 1 certification.

Neither World Health Organization nor USAID holds SOC 2 Type 2 certification.

Neither World Health Organization nor USAID holds ISO 27001 certification.

Neither World Health Organization nor USAID holds PCI DSS certification.

Neither World Health Organization nor USAID holds HIPAA certification.

Neither World Health Organization nor USAID holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X