Company Details
9-to-5-seating
59
5,679
337
9to5seating.com
0
9TO_5316197
In-progress

9to5 Seating Company CyberSecurity Posture
9to5seating.com9to5 Seating is a vertically-integrated, privately owned company, founded in 1986, which specializes in the design and production of ergonomic office seating to accommodate the rigorous demands of today’s office environments. 9to5 Seating presents an extensive collection of executive, task, guest, conference, stool and lounge seating. Customization is an everyday demand that 9to5 Seating welcomes; seats, controls, arms, chair adjustments, finishes, and upholstery options are plentiful. 9to5 Seating combines its state-of-the-art, in-house manufacturing systems with a commitment to continuous improvements in all phases of the operation. With over 500,000 sq. ft. of manufacturing resources, we are confidently empowered to deliver products offered at unparalleled pricing, with quality built into every phase of manufacturing. Our dedication to becoming the leader in office furniture requires that we go beyond customer expectations. We strive to provide quality products, plethora of upholstery options, express shipping superior customer service and the best warranty as possible.
Company Details
9-to-5-seating
59
5,679
337
9to5seating.com
0
9TO_5316197
In-progress
Between 750 and 799

9to5 Seating Global Score (TPRM)XXXX



No incidents recorded for 9to5 Seating in 2025.
No incidents recorded for 9to5 Seating in 2025.
No incidents recorded for 9to5 Seating in 2025.
9to5 Seating cyber incidents detection timeline including parent company and subsidiaries

9to5 Seating is a vertically-integrated, privately owned company, founded in 1986, which specializes in the design and production of ergonomic office seating to accommodate the rigorous demands of today’s office environments. 9to5 Seating presents an extensive collection of executive, task, guest, conference, stool and lounge seating. Customization is an everyday demand that 9to5 Seating welcomes; seats, controls, arms, chair adjustments, finishes, and upholstery options are plentiful. 9to5 Seating combines its state-of-the-art, in-house manufacturing systems with a commitment to continuous improvements in all phases of the operation. With over 500,000 sq. ft. of manufacturing resources, we are confidently empowered to deliver products offered at unparalleled pricing, with quality built into every phase of manufacturing. Our dedication to becoming the leader in office furniture requires that we go beyond customer expectations. We strive to provide quality products, plethora of upholstery options, express shipping superior customer service and the best warranty as possible.


We are Arco. We make tables. That’s where our strength lies and that is what we have been doing as a family business for over a hundred years. Tables have a central place in our lives: we talk, work, eat, meet and celebrate at the table, whether at home, in the office, in a restaurant or library. We

Chicago Style Furniture - Featured on ABC Morning News as Chicago land's Best Bargain Furniture Store. - Mr. Cheap’s Chicago as one of the best furniture bargains in Chicago. - Chicago Magazine’s Best Store Issue. Shop Small We opened in 1977 as one of Chicago's first stores to carry ready to ass

All our lines of solid oak CD storage racks, DVD storage racks, VHS and cassette storage racks, and bookcases are made with the same attention to detail and quality as the fine pieces of furniture that has brought our family fame for over six generations. Our units for CD storage racks, DVD storage

Established in 1990, Hunts Office Furniture has expanded over the last 20 years to become an unrivaled, one-stop solution for office workspace requirements. We're proud to have won Steelcase Platinum Partner status four years in a row, and show no signs of slowing down. A comprehensive commercial i

Founded as a result of our desire to provide access to high quality, unique home products with the extensive use of specialty materials from around the world. Shadow Mountain is a full line of imported and USA made products of unique Bedroom, Dining Room, Occasional, Upholstery, Area Rugs, Accent

Loll designs and manufactures all-weather, outdoor furniture made from ultra-durable high density polyethylene (HDPE), partially from recycled materials and is 100% recyclable. Loll’s modern outdoor furniture adds a unique and contemporary aesthetic to outdoor spaces. All of our outdoor furniture is
.png)
The report warns that poorly designed, misaligned, or overly prescriptive regulation can create unnecessary costs, divert resources from...
Cyberthreats aren't slowing down, and in this environment, by implementing cybersecurity programs, universities help their students resist...
This session examines the rapid escalation of OT focused cyberattacks across the Asia Pacific region, drawing on real incidents from manufacturing,...
Why Cybersecurity Is Now a Survival Issue for NGOs and Civil Society in 2025. At 2:13 a.m., a humanitarian coordination platform went dark.
Press release - Virtue Market Research - Global Chemical Industry Cybersecurity Market is projected to reach the value of $28.4 Billion by...
Beijing will tighten oversight of artificial intelligence and other fast-moving technologies under its newly amended Cybersecurity Law,...
2N has been officially recognised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA).
SEOUL, South Korea, Nov. 28, 2025 /PRNewswire/ -- AUTOCRYPT, an end-to-end automotive cybersecurity solution provider, announced that in...
The UK Cybersecurity and Resilience Bill signals a major shift in national cyber regulation, strengthening standards to address evolving...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 9to5 Seating is http://www.9to5seating.com.
According to Rankiteo, 9to5 Seating’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, 9to5 Seating currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 9to5 Seating is not certified under SOC 2 Type 1.
According to Rankiteo, 9to5 Seating does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 9to5 Seating is not listed as GDPR compliant.
According to Rankiteo, 9to5 Seating does not currently maintain PCI DSS compliance.
According to Rankiteo, 9to5 Seating is not compliant with HIPAA regulations.
According to Rankiteo,9to5 Seating is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
9to5 Seating operates primarily in the Furniture and Home Furnishings Manufacturing industry.
9to5 Seating employs approximately 59 people worldwide.
9to5 Seating presently has no subsidiaries across any sectors.
9to5 Seating’s official LinkedIn profile has approximately 5,679 followers.
9to5 Seating is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, 9to5 Seating does not have a profile on Crunchbase.
Yes, 9to5 Seating maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/9-to-5-seating.
As of November 28, 2025, Rankiteo reports that 9to5 Seating has not experienced any cybersecurity incidents.
9to5 Seating has an estimated 2,616 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 9to5 Seating has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.