Company Details
casual-contract-inc-
6
21
337
casualcontract.com
0
CAS_3179161
In-progress

Casual Contract, Inc. Company CyberSecurity Posture
casualcontract.comOur showroom features contract and residential outdoor furnishings and fabrics, including contract dining and seating. All items represented by our showroom are available for purchase through a qualified trade professional. Lines represented are: Brown Jordan, Barlow Tyrie, Castelle, Cane-line Couverture, DEDON, Gloster, Houe, Kingsley-Bate, Lloyd Flanders, Nardi, Nellie Olson Home & Garden, Seaside Casual, Summer Classics, Sunbrella Fabrics, Treasure Garden, Tuuci, Tropitone and more.
Company Details
casual-contract-inc-
6
21
337
casualcontract.com
0
CAS_3179161
In-progress
Between 750 and 799

CCI Global Score (TPRM)XXXX



No incidents recorded for Casual Contract, Inc. in 2025.
No incidents recorded for Casual Contract, Inc. in 2025.
No incidents recorded for Casual Contract, Inc. in 2025.
CCI cyber incidents detection timeline including parent company and subsidiaries

Our showroom features contract and residential outdoor furnishings and fabrics, including contract dining and seating. All items represented by our showroom are available for purchase through a qualified trade professional. Lines represented are: Brown Jordan, Barlow Tyrie, Castelle, Cane-line Couverture, DEDON, Gloster, Houe, Kingsley-Bate, Lloyd Flanders, Nardi, Nellie Olson Home & Garden, Seaside Casual, Summer Classics, Sunbrella Fabrics, Treasure Garden, Tuuci, Tropitone and more.


Bluesky Office is based in the Channel Islands specialising in the design, supply and installation of office furniture. We create modern ergonomic environments to fulfil the client's needs. List of services: • Furniture specifications and installation • CAD service including 3D visualisations • F

Emmegi, one of the over 30 companies owned by the biggest italian group in the furnishing field DOIMO group, is manufacturing office,community chairs as well as seating systems for all kind of waiting areas, lounge situations and seating for auditoria, universities, colleges. The brand is synonymous

In 1991, Rooms To Go started by opening two stores in Orlando, Florida, bringing to customers a new way to buy furniture - a simplified shopping experience, where every detail of a room package is coordinated by world-class designers, and then bundled to increase savings. Today, we are over 8,500

We "Make Space Work" for government, businesses, educational institutions, healthcare, and private customers! Whether you’re looking to buy a chair, full-scale office seating, files, lights, or even walls and floors, we deliver what you need when you need it - no job is too big or too small. Visi

Since 1976 Tayco has been a Canadian manufacturer of high quality workplace furnishings. Tayco’s product offering and services have evolved with the changing demands of the marketplace. We listen to our customers and take enormous pride in integrating their feedback in designs and solutions that wor

Lorick Office Products is local woman-owned business located in the Vista area of downtown Columbia. The owners, Jeanne Brutchey and KareBroach are third generation Lorick's. We offer a full line of office furniture, office supplies and interior design services. Our team consist of knowledgeable e
.png)
The Jamaican Government, after months of silence, has disclosed that it has signed a five-year J$4-billion contract with the Israeli firm ELTA Systems Limited.
We're an iconic Aussie brand with a global footprint. Our purpose is to build a connected future so everyone can thrive. We're all about providing the best...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Casual Contract, Inc. is http://www.casualcontract.com.
According to Rankiteo, Casual Contract, Inc.’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, Casual Contract, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Casual Contract, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Casual Contract, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Casual Contract, Inc. is not listed as GDPR compliant.
According to Rankiteo, Casual Contract, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Casual Contract, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Casual Contract, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Casual Contract, Inc. operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Casual Contract, Inc. employs approximately 6 people worldwide.
Casual Contract, Inc. presently has no subsidiaries across any sectors.
Casual Contract, Inc.’s official LinkedIn profile has approximately 21 followers.
No, Casual Contract, Inc. does not have a profile on Crunchbase.
Yes, Casual Contract, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/casual-contract-inc-.
As of November 28, 2025, Rankiteo reports that Casual Contract, Inc. has not experienced any cybersecurity incidents.
Casual Contract, Inc. has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Casual Contract, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.