Comparison Overview

Cell C

VS

BT Group

Cell C

Cnr Maxwell Drive and Pretoria Main Road, Buccleuch, Gauteng, ZA
Last Update: 2025-12-17
Between 650 and 699

Cell C Limited, launched in 2001, is a proudly South African customer-first digital provider of services that promotes digital inclusion. The organisation does this by championing the needs, passions, interests and motivations of customers to be at their best, empowering them to achieve and enjoy what they want to, by offering better value, differentiated propositions, connection and access. Cell C is committed to bridging the digital divide in South Africa and ensuring that everyone enjoys the benefits of a modern, connected world. Cell C is a Level 1 Broad-based Black Economic Empowerment (B-BBEE) contributor, with a focused transformation strategy premised on delivering meaningful diversity, inclusion and empowerment that has a positive impact on our economy and society as a whole. Our CSI Programmes: • SEE YOUTH powered by Cell C • Acts of Kindness • Cell C Bursary Fund • Equitable Digital Access • Employee Volunteerism View our privacy policy at www.cellc.co.za

NAICS: 517
NAICS Definition: Telecommunications
Employees: 4,059
Subsidiaries: 0
12-month incidents
1
Known data breaches
0
Attack type number
1

BT Group

One Braham, London, undefined, E1 8EE, GB
Last Update: 2025-12-17
Between 700 and 749

We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, connections are becoming even more important to everyday life. Today, that’s truer than ever. The connections we make are helping solve the world’s biggest challenges such as the global pandemic, climate change and cyber security. Through the power of technology, we’re supporting customers to live, work and play together better.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 75,585
Subsidiaries: 10
12-month incidents
0
Known data breaches
0
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cell-c.jpeg
Cell C
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/bt.jpeg
BT Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Cell C
100%
Compliance Rate
0/4 Standards Verified
BT Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

Cell C has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for BT Group in 2025.

Incident History — Cell C (X = Date, Y = Severity)

Cell C cyber incidents detection timeline including parent company and subsidiaries

Incident History — BT Group (X = Date, Y = Severity)

BT Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cell-c.jpeg
Cell C
Incidents

Date Detected: 4/2025
Type:Ransomware
Blog: Blog
https://images.rankiteo.com/companyimages/bt.jpeg
BT Group
Incidents

Date Detected: 12/2024
Type:Ransomware
Blog: Blog

Date Detected: 05/2018
Type:Data Leak
Attack Vector: Exposed Default Password
Motivation: Unintentional Exposure
Blog: Blog

FAQ

BT Group company demonstrates a stronger AI Cybersecurity Score compared to Cell C company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

BT Group company has faced a higher number of disclosed cyber incidents historically compared to Cell C company.

In the current year, Cell C company has reported more cyber incidents than BT Group company.

Both BT Group company and Cell C company have confirmed experiencing at least one ransomware attack.

Neither BT Group company nor Cell C company has reported experiencing a data breach publicly.

Neither BT Group company nor Cell C company has reported experiencing targeted cyberattacks publicly.

Neither Cell C company nor BT Group company has reported experiencing or disclosing vulnerabilities publicly.

Neither Cell C nor BT Group holds any compliance certifications.

Neither company holds any compliance certifications.

BT Group company has more subsidiaries worldwide compared to Cell C company.

BT Group company employs more people globally than Cell C company, reflecting its scale as a Telecommunications.

Neither Cell C nor BT Group holds SOC 2 Type 1 certification.

Neither Cell C nor BT Group holds SOC 2 Type 2 certification.

Neither Cell C nor BT Group holds ISO 27001 certification.

Neither Cell C nor BT Group holds PCI DSS certification.

Neither Cell C nor BT Group holds HIPAA certification.

Neither Cell C nor BT Group holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X