Comparison Overview

TDS®

VS

Colt Technology Services

TDS®

8401 Greenway Boulevard, Suite 230, Middleton, WI, US, 53562
Last Update: 2026-01-12
Between 750 and 799

Telephone and Data Systems (TDS) provides wireless products and services; cable and wireline broadband, TV and voice services to approximately 5.5 million customers nationwide. The TDS companies share a strong commitment to customer satisfaction by offering the highest-quality services and products and excellent customer support. UScellular® UScellular, headquartered in Chicago, IL, provides a comprehensive range of wireless services and products, excellent customer support, and a high-quality network to 5 million customers nationwide. UScellular is traded on the New York Stock Exchange under USM. TDS Telecommunications Corp.® TDS Telecommunications Corp., headquartered in Madison, WI, provides high-speed Internet, phone and TV entertainment services, as well as VoIP business solutions, to customers in rural, suburban and metropolitan communities nationwide. Suttle-Straus® Suttle-Straus provides comprehensive marketing solutions including creative design, mailing, fulfillment, distribution, displays, signage, promotional products, conventional and digital printing.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 3,529
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Colt Technology Services

Colt House, 20 Great Eastern Street, London, GB, EC3A 3EH
Last Update: 2026-01-14
Between 600 and 649

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed. Powered by amazing people and like-minded partners, Colt is driven by its purpose: to put the power of the digital universe in the hands of its customers, wherever, whenever and however they choose. Since 1992, Colt has set itself apart through its deep commitment to its customers, growing from its heritage in the City of London to a global business spanning 40+ countries, with over 6,000 employees and more than 80 offices around the world. Colt’s customers benefit from expansive digital infrastructure connecting 32,000 buildings across 230 cities, more than 50 Metropolitan Area Networks and 250+ Points of Presence across Europe, Asia, the Middle East, Africa and North America’s largest business hubs. Privately owned, Colt is one of the most financially sound companies in the sector. Obsessed with delivering industry-leading customer experience, Colt is guided by its dedication to customer innovation, by its values and its responsibility to its customers, partners, people and the planet. For more information, please visit www.colt.net

NAICS: 517
NAICS Definition: Telecommunications
Employees: 5,212
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/-tds-.jpeg
TDS®
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/colt-technology-services.jpeg
Colt Technology Services
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
TDS®
100%
Compliance Rate
0/4 Standards Verified
Colt Technology Services
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for TDS® in 2026.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Colt Technology Services in 2026.

Incident History — TDS® (X = Date, Y = Severity)

TDS® cyber incidents detection timeline including parent company and subsidiaries

Incident History — Colt Technology Services (X = Date, Y = Severity)

Colt Technology Services cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/-tds-.jpeg
TDS®
Incidents

Date Detected: 1/2021
Type:Breach
Attack Vector: External System Breach (Hacking)
Blog: Blog
https://images.rankiteo.com/companyimages/colt-technology-services.jpeg
Colt Technology Services
Incidents

Date Detected: 8/2025
Type:Ransomware
Attack Vector: Exploitation of Critical SharePoint Flaws (July 2025), Ransomware-as-a-Service (RaaS) Model
Motivation: Financial Gain, Proving Capabilities as a New Ransomware Group
Blog: Blog

Date Detected: 8/2024
Type:Cyber Attack
Attack Vector: Unknown (suspected SharePoint exploitation), Possible webshell implantation
Blog: Blog

FAQ

TDS® company demonstrates a stronger AI Cybersecurity Score compared to Colt Technology Services company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Colt Technology Services company has faced a higher number of disclosed cyber incidents historically compared to TDS® company.

In the current year, Colt Technology Services company and TDS® company have not reported any cyber incidents.

Colt Technology Services company has confirmed experiencing a ransomware attack, while TDS® company has not reported such incidents publicly.

TDS® company has disclosed at least one data breach, while the other Colt Technology Services company has not reported such incidents publicly.

Colt Technology Services company has reported targeted cyberattacks, while TDS® company has not reported such incidents publicly.

Neither TDS® company nor Colt Technology Services company has reported experiencing or disclosing vulnerabilities publicly.

Neither TDS® nor Colt Technology Services holds any compliance certifications.

Neither company holds any compliance certifications.

Neither TDS® company nor Colt Technology Services company has publicly disclosed detailed information about the number of their subsidiaries.

Colt Technology Services company employs more people globally than TDS® company, reflecting its scale as a Telecommunications.

Neither TDS® nor Colt Technology Services holds SOC 2 Type 1 certification.

Neither TDS® nor Colt Technology Services holds SOC 2 Type 2 certification.

Neither TDS® nor Colt Technology Services holds ISO 27001 certification.

Neither TDS® nor Colt Technology Services holds PCI DSS certification.

Neither TDS® nor Colt Technology Services holds HIPAA certification.

Neither TDS® nor Colt Technology Services holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.

Risk Information
cvss3
Base: 5.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H