Company Details
computer-forms-inc.
26
100
323
computerforms.biz
0
COM_1855283
In-progress

Computer Forms, Inc. Company CyberSecurity Posture
computerforms.bizComputer Forms, Inc. (CFI) was founded in 1970 upon the conviction that businesses deserve and expect a superior level of service and integrity from their vendors and business partners. 30,000+ customers later, CFI continues to build upon that conviction by providing security, convenience, and value to large and small customers throughout the United States. Our state-of-the-art printing facility in Tualatin, Ore. produces uncompromised quality printed products for our three divisions. Computer Forms, Inc. produces business checks, forms, corporate communications products, and promotional product items. Superior Screen Systems (Tri-S) specializes in direct screen printing on glass, plastic or metal bottles and jars. Tri-S also specializes in custom printing on glassware for wine, beer and spirits. Isoprint specializes in medical component printing. We are ISO 9001:2000 compliant. At CFI, we practice sustainability. We are committed to working with our customers, employees and suppliers to help promote sustainability, reduce waste, and keep our planet clean. We are 100% powered by renewable wind energy, practice fuel conservation and waste reduction, and have purchased wetlands in Tualatin, Ore. to protect them from development and contamination.
Company Details
computer-forms-inc.
26
100
323
computerforms.biz
0
COM_1855283
In-progress
Between 750 and 799

CFI Global Score (TPRM)XXXX



No incidents recorded for Computer Forms, Inc. in 2025.
No incidents recorded for Computer Forms, Inc. in 2025.
No incidents recorded for Computer Forms, Inc. in 2025.
CFI cyber incidents detection timeline including parent company and subsidiaries

Computer Forms, Inc. (CFI) was founded in 1970 upon the conviction that businesses deserve and expect a superior level of service and integrity from their vendors and business partners. 30,000+ customers later, CFI continues to build upon that conviction by providing security, convenience, and value to large and small customers throughout the United States. Our state-of-the-art printing facility in Tualatin, Ore. produces uncompromised quality printed products for our three divisions. Computer Forms, Inc. produces business checks, forms, corporate communications products, and promotional product items. Superior Screen Systems (Tri-S) specializes in direct screen printing on glass, plastic or metal bottles and jars. Tri-S also specializes in custom printing on glassware for wine, beer and spirits. Isoprint specializes in medical component printing. We are ISO 9001:2000 compliant. At CFI, we practice sustainability. We are committed to working with our customers, employees and suppliers to help promote sustainability, reduce waste, and keep our planet clean. We are 100% powered by renewable wind energy, practice fuel conservation and waste reduction, and have purchased wetlands in Tualatin, Ore. to protect them from development and contamination.


The DocuCentre itself, is a member of the TSL Group of companies. Established in 1998, we provide Online Printing Services, document digitization services and digital print-on-demand products and services. Our Head Office is located at #80 Woodford Street, Newtown our sub-branch is at Atlantic Plaza

Since 1945, Nite-Bright has provided turnkey graphic marketing solutions to communicate our clients' image, identity, and attitude. Three generations of Mathey family have made Nite-Bright one of the most trusted family-owned and operated large format graphics specialists in the USA. Our proprietary

With a customer service focus that is second to none, Northeast Digital Imaging is a graphic service large format printing company. With decades of experience and all of the resources you need, we synthesize technology to build your brand and set you apart - on time and on budget. We create a world

With over 30 years of experience in the industry, we have established ourselves as a reliable Top 40 Supplier. We pride ourselves on delivering innovative, branded, and sustainable products, providing your business with quality branding solutions that leave a lasting impact on your target audience.

Specialists in high quality Plastic Card Printing since 1999to meet our clients specification and budget to ensure customer satisfaction Tarjetas Técnicas es una empresa con experiencia imprimiendo en plástico desde 1999. Nuestro compromiso es ser una solución para nuestros Clientes diseñando e imp

Copy Cat Printing is a family-owned company serving the Richmond area and surrounding counties. It handles all forms of full scale print production. Impressum Input Impressum for your Page Long Description We're a family-owned, full scale print shop based in Richmond, Virginia. We have two locat
.png)
Discover the types of cyber attacks, their impact, and effective strategies to protect against common cybersecurity threats.
Looking to invest in the leading cybersecurity companies? Here are the top six cybersecurity ETFs to consider investing in.
CISA has curated a database of no-cost cybersecurity services and tools as part of our continuing mission to reduce cybersecurity risk across U.S. critical...
The HIPAA training requirements are that “a covered entity must train all members of its workforce on policies and procedures […]
Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.
Cybersecurity is touted as having a zero unemployment rate. It is one of the fastest-growing and in-demand professions in the world today as...
U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities...
These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.
Cybersecurity stocks rank No. 19 out of 197 IBD industry groups. The impact of President Trump's tariff-based trade policies are a wild...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Computer Forms, Inc. is https://www.computerforms.biz.
According to Rankiteo, Computer Forms, Inc.’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, Computer Forms, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Computer Forms, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Computer Forms, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Computer Forms, Inc. is not listed as GDPR compliant.
According to Rankiteo, Computer Forms, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Computer Forms, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Computer Forms, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Computer Forms, Inc. operates primarily in the Printing Services industry.
Computer Forms, Inc. employs approximately 26 people worldwide.
Computer Forms, Inc. presently has no subsidiaries across any sectors.
Computer Forms, Inc.’s official LinkedIn profile has approximately 100 followers.
No, Computer Forms, Inc. does not have a profile on Crunchbase.
Yes, Computer Forms, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/computer-forms-inc..
As of December 17, 2025, Rankiteo reports that Computer Forms, Inc. has not experienced any cybersecurity incidents.
Computer Forms, Inc. has an estimated 5,157 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Computer Forms, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.