Rankiteo Logo
Rankiteo

The Rankiteo MCP server is now available.

Discover MCP
!

Top 25 Worst IT Services and IT Consulting Companies

Identify the lowest-scoring most renowned IT Services and IT Consulting companies. Understand where critical cyber risk exposure exists in this industry. 1226 companies scored.

4,808
Companies in Industry
1226
Scored
748.1
Avg Score
349
Cyber Incidents
Bottom 25
Shown

IT Services and IT Consulting Cybersecurity Risk Assessment - Lowest-Scoring Companies in 2026

Out of 4,808 it services and it consulting companies monitored by Rankiteo, this page highlights the Bottom 25 organizations with the weakest cybersecurity posture. These rankings are based on our proprietary Cyber Resilience Score, which integrates time-decayed incident exposure, sector-sensitive impact analysis, and market-cap-aware baseline and dampening to produce a single, interpretable score between 100 and 1,000.

Companies at the bottom of this ranking carry the heaviest accumulated cyber incident burden - including recent or severe ransomware attacks, data breaches with significant financial losses or records exposed, and repeated disclosure events. Their scores are further influenced by sector-specific impact multipliers that amplify penalties in high-criticality industries. Understanding where these risk concentrations exist is essential for supply chain risk management, regulatory compliance, and competitive benchmarking within the it services and it consulting industry.

The current average score for the most renowned IT Services and IT Consulting companies is 748.1 out of 1,000. Companies shown below score significantly lower than this average, falling far behind an industry that generally maintains reasonable security standards.

Risk Highlights

643
Lowest Score
748.1
Industry Average
4%
Scoring B or Below
349
Recorded Incidents
AI Analysis

Cyber Risk in IT Services and IT Consulting

Generating industry analysis...

Score Distribution

Aaa
0 (0.0%)
Aa
0 (0.0%)
A
19 (1.5%)
Baa
988 (80.6%)
Ba
164 (13.4%)
B
26 (2.1%)
Caa
12 (1.0%)
Ca
5 (0.4%)
C
12 (1.0%)
#CompanyLabelScoreBandIncidentsScore Bar
1
Change Healthcarechangehealthcare.com
Computer Systems Design and Related Services100C18
2
Ingram Microingrammicro.com
Computer Systems Design and Related Services100C5
3
Oracleoracle.com
Computer Systems Design and Related Services100C22
4
TransUniontransunion.com
Computer Systems Design and Related Services269C12
5
Hyundai AutoEver Americahaeaus.com
Computer Systems Design and Related Services332C8
6
F5f5.com
Computer Systems Design and Related Services345C9
7
Microsoft Securitymicrosoft.com
Computer Systems Design and Related Services393C8
8
Global Cyber Allianceglobalcyberalliance.org
Computer Systems Design and Related Services405C1
9
Episourceepisource.com
Computer Systems Design and Related Services441C3
10
Verizonverizon.com
Computer Systems Design and Related Services466C12
11
TriZetto Healthcare Productscognizant.com
Computer Systems Design and Related Services510C4
12
Pure Storagepurestorage.com
Computer Systems Design and Related Services537C2
13
Capitacapita.com
Computer Systems Design and Related Services553Ca3
14
Telesigntelesign.com
Computer Systems Design and Related Services568Ca1
15
FEI Systemsfeisystems.com
Computer Systems Design and Related Services577Ca4
16
Cognizantcognizant.com
Computer Systems Design and Related Services579Ca1
17
Health Catalysthealthcatalyst.com
Computer Systems Design and Related Services594Ca1
18
Sopra Steriasoprasteria.com
Computer Systems Design and Related Services610Caa2
19
NTT DOCOMO BUSINESSntt.com
Computer Systems Design and Related Services612Caa2
20
Accelyaaccelya.com
Computer Systems Design and Related Services635Caa1
21
Spartan Technologiesspartantech.net
Computer Systems Design and Related Services637Caa1
22
Rackspace Technologyrackspace.com
Computer Systems Design and Related Services639Caa3
23
XTIUMxtium.com
Computer Systems Design and Related Services641Caa1
24
IBMibm.com
Computer Systems Design and Related Services642Caa14
25
Seeing Machinesseeingmachines.com
Computer Systems Design and Related Services643Caa1

How Cyber Risk Scores Are Calculated

Rankiteo's Cyber Resilience Score produces a single value between 100 and 1,000 for each organization, where higher scores indicate lower estimated cyber risk. The framework integrates three principal components that together balance evidence, context, and comparability across industries and company sizes. Learn more in our AI Cyber Score methodology.

Core Scoring Components

  • Time-Decayed Incident Exposure (Pinc): Every confirmed cyber incident - ransomware, data breach, cyber attack, or disclosed vulnerability - contributes a penalty weighted by recency and scaled by quantitative severity (financial loss and records exposed). Category-specific base weights reflect real-world impact: ransomware (100 pts), data breach (60 pts), cyber attack (20 pts), and vulnerability (5 pts). Each category decays at a different rate - roughly 3 years for ransomware and data breaches, 2 years for cyber attacks, and 18 months for vulnerabilities - so older, lower-impact events fade while recent, severe incidents retain lasting influence.
  • Sector-Sensitive Impact Multipliers: Identical incidents carry different weight depending on the industry. Each NAICS sector receives multipliers based on four dimensions: safety-of-life risk, service continuity, regulatory/legal exposure, and data sensitivity. A ransomware attack on a hospital or utility carries a higher penalty than the same attack on a retail company, reflecting the greater real-world consequences.
  • Market-Cap Baseline & Dampening: A logistic baseline between 750 and 850 anchors each company's starting score based on organizational size. A continuous dampening factor attenuates incident penalties for very large firms, recognizing higher disclosure rates and greater absorption capacity - without masking genuinely severe events.
  • Industry Adjustment (Aind): A bounded additive term derived from NAICS-level historical incident-rate z-scores. This rewards companies in historically resilient sectors, but only when they maintain a clean or near-clean record. Once material incidents occur, firm-specific performance dominates.
  • Quantitative Severity Scaling: When financial loss or records-exposed data is available, incident penalties are amplified proportionally - scaled relative to market capitalization so the same dollar loss has a larger effect on a smaller firm. The combined severity multiplier caps at 3×.
  • Ransomware Recurrence Escalation: Repeated ransomware events trigger a bounded recurrence multiplier (up to 1.5×), reflecting elevated systemic risk from persistent adversarial footholds or remediation failures.

Understanding the Risk Bands

Each score maps to a letter-grade band. Companies appearing in this lowest-scoring ranking typically fall in the bottom bands:

  • Aaa (900–1,000): Exceptional cyber resilience - very few companies in a worst list reach this level.
  • Aa (800–899): Very strong security posture with minimal weaknesses.
  • A (700–799): Strong practices with some areas for improvement.
  • Baa (600–699): Adequate protection but notable security configuration gaps exist.
  • Ba (500–599): Below average - multiple risk areas require attention.
  • B (400–499): Weak security with significant exposure across categories.
  • Caa (300–399): Very weak with a high probability of exploitable vulnerabilities.
  • Ca (200–299): Critically poor with severe, widespread security gaps.
  • C (0–199): Extreme risk - immediate remediation is needed across all dimensions.

Why Monitoring Low-Scoring IT Services and IT Consulting Companies Matters

Cybersecurity risk doesn't exist in isolation. If your organization works with, purchases from, or shares data with companies in the it services and it consulting sector, their security weaknesses become your risk. Supply chain attacks - where adversaries compromise a less-secure vendor to reach a larger target - have become one of the most common and damaging attack vectors in recent years.

By identifying the lowest-scoring it services and it consulting companies, procurement teams, risk managers, CISOs, and compliance officers can:

  • Flag third-party vendors that may introduce unacceptable risk into the supply chain.
  • Require cybersecurity improvement plans as part of vendor management and contract renewal processes.
  • Benchmark their own organization against industry peers and understand where the floor lies.
  • Satisfy regulatory due-diligence requirements such as those mandated by NIS2, DORA, SOC 2, and ISO 27001 supply chain provisions.

Rankiteo continuously monitors 4,808 it services and it consulting companies keeping these rankings up to date so you always have an accurate, current picture of the sector's risk landscape.

Top 25 Worst It Services And It Consulting Companies by Cybersecurity Score (2026) | Rankiteo | Rankiteo