Company Details
altworkstations
8
6,252
337
altwork.com
0
ALT_3186057
In-progress

Altwork Company CyberSecurity Posture
altwork.comHeadquartered in the San Francisco Bay Area, Altwork designs and manufactures office furniture for today's innovators and creators. Our first product - the Altwork Station - is an all-in-one workstation that allows users to sit, stand, collaborate and use patented technology to transform their workstation into a focus position for sitting, reclining and standing desk for high-intensity computer users. Founded by serial entrepreneurs and investors, John Speicher and Che Voigt, Altwork's mission is to create furniture that makes the body comfortable so the mind can be free. More information is available at http://www.altwork.com.
Company Details
altworkstations
8
6,252
337
altwork.com
0
ALT_3186057
In-progress
Between 750 and 799

Altwork Global Score (TPRM)XXXX



No incidents recorded for Altwork in 2025.
No incidents recorded for Altwork in 2025.
No incidents recorded for Altwork in 2025.
Altwork cyber incidents detection timeline including parent company and subsidiaries

Headquartered in the San Francisco Bay Area, Altwork designs and manufactures office furniture for today's innovators and creators. Our first product - the Altwork Station - is an all-in-one workstation that allows users to sit, stand, collaborate and use patented technology to transform their workstation into a focus position for sitting, reclining and standing desk for high-intensity computer users. Founded by serial entrepreneurs and investors, John Speicher and Che Voigt, Altwork's mission is to create furniture that makes the body comfortable so the mind can be free. More information is available at http://www.altwork.com.


Associates Purchasing is a preferred Knoll dealer. In addition to the over 200 manufacturers we represent, we also provide furniture planning, procurement, project management, reconfiguration, refurbishment and repair services. AP is committed to delivering superior quality — products and se

Interior Workplace Solutions is the leading provider of facilities management within the Lehigh Valley and Berks Areas. At IWS, we pride ourselves on our Knowledge of Industry trends and utilize that information to offer quality products coupled with excellent customer service to bring the total o

Center Line Associates will guide you in creating an environment that will fulfill your organization's requirements, reflect a modern style and create a workplace that is attractive. Our office furniture, desks, and chairs provide comfort and productivity for you. Our team of "hands on" managemen
Nearly 30% of orders from ecommerce retailers like Wayfair get returned upon delivery. Unfortunately, these big bulky items are hard to enter back into inventory. This means items end up getting trashed and consumers miss a huge opportunity. This is where Loveseat.com comes in. We operate weekly onl

Arthur P. O’Hara Inc. is the company Chicago goes to for their office furniture solutions. Our satisfied customers have come to expect flexibility, speed, and convenience with a reputation for having a solution for just about any office furniture need-and a unique ability to "make it happen." Wheth
FOB sources furniture and customizes furniture for the multi-housing industry, especially student housing.Founded in 2003 and based in Fort Mill SC, FOB serves all regions of the nation. Its core business is designing furniture specific to a company’s needs, then fulfilling the goods direct from int
.png)
Kathmandu. In recent years, the number of business leaders, landowners and high-income earners has increased significantly as economic...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Altwork is https://www.altwork.com.
According to Rankiteo, Altwork’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Altwork currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Altwork is not certified under SOC 2 Type 1.
According to Rankiteo, Altwork does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Altwork is not listed as GDPR compliant.
According to Rankiteo, Altwork does not currently maintain PCI DSS compliance.
According to Rankiteo, Altwork is not compliant with HIPAA regulations.
According to Rankiteo,Altwork is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Altwork operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Altwork employs approximately 8 people worldwide.
Altwork presently has no subsidiaries across any sectors.
Altwork’s official LinkedIn profile has approximately 6,252 followers.
Yes, Altwork has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/altwork.
Yes, Altwork maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/altworkstations.
As of November 28, 2025, Rankiteo reports that Altwork has not experienced any cybersecurity incidents.
Altwork has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Altwork has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.