ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Contract Source Group was established in Michigan and remains a proud Michigan company located in Bloomfield Hills. CSG is a customer-driven representative of several different contract furniture and textiles manufacturers for commercial, healthcare, hospitality, education, community, and office markets. We are focused and driven on relationships - with our manufactures, dealers, A & D firms, community and team, gaining integrity and trust at each level. How can we help you?

Contract Source Group A.I CyberSecurity Scoring

CSG

Company Details

Linkedin ID:

contract-source-group

Employees number:

10

Number of followers:

799

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

csgreps.com

IP Addresses:

0

Company ID:

CON_5320515

Scan Status:

In-progress

AI scoreCSG Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/contract-source-group.jpeg
CSG Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCSG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/contract-source-group.jpeg
CSG Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CSG Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

CSG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CSG

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Contract Source Group in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Contract Source Group in 2025.

Incident Types CSG vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for Contract Source Group in 2025.

Incident History — CSG (X = Date, Y = Severity)

CSG cyber incidents detection timeline including parent company and subsidiaries

CSG Company Subsidiaries

SubsidiaryImage

Contract Source Group was established in Michigan and remains a proud Michigan company located in Bloomfield Hills. CSG is a customer-driven representative of several different contract furniture and textiles manufacturers for commercial, healthcare, hospitality, education, community, and office markets. We are focused and driven on relationships - with our manufactures, dealers, A & D firms, community and team, gaining integrity and trust at each level. How can we help you?

Loading...
similarCompanies

CSG Similar Companies

Restwell Sleep Products

We are Restwell Sleep Products, a fast growing privately owned and operated manufacturer and distributor of mattresses, foundations and other related sleep products. Restwell Sleep Products began as a small family run operation in 1990. Today, we are one of Western Canada’s largest privately owned m

Vermont Farm Table

At Vermont Farm table we specialize in premium solid wood tables and seating for commercial and residential projects. Design is at the center if our work at Vermont Farm Table. Everything we build is an intentional balance between beauty and function, brought to life using premium materials. We over

Best Buy Furniture Inc

Best Buy Furniture has been doing business around the east coast since 2001.We have been serving the cherry hill , Pennsylvania , Camden , Philadelphia and the rest of the area for the past years with the best service and prices. Our specialty is our buying power. While most retail stores charge nor

Herman Miller

Over the last century, Herman Miller has been guided by a commitment to problem-solving designs that inspire the best in people. Along the way, Herman Miller has forged critical relationships with the most visionary designers of the day, from mid-century greats like George Nelson, the Eames Office,

Nexus Interiors Australia

Nexus Interiors Australia connects businesses, employees and all end users with furniture solutions that are beautifully designed, easy to use and cost effective. Current preferred suppliers to all municipalities in Victoria and Tasmania, Catholic Education of Melbourne, various universities and a

English Georgian America

When you think about English Georgian America, think best design, best quality and best price. This is our promise to you and our guiding principle when creating our pieces or selecting something for our in-stock program. We will work hard to earn your business whether you're furnishing your home, o

newsone

CSG CyberSecurity News

September 22, 2025 07:00 AM
DoD Finalizes Cybersecurity Maturity Model Certification Rule: What Defense Contractors Need to Know

On September 10, 2025, the U.S. Department of Defense (DoD) published a final rule that will shake up cybersecurity compliance for DoD...

September 22, 2025 07:00 AM
43 Top Cybersecurity Companies to Know 2025

These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.

August 11, 2025 07:00 AM
Cencora & The Lash Group Settle Data Breach Litigation for $40 Million

Cencora, The Lash Group, and their affiliates have agreed to pay $40 million to settle class action data breach litigation over a February...

July 07, 2025 07:00 AM
Will Cybersecurity Stocks Out-Perform As Geopolitical Threats Climb?

Cybersecurity stocks rank No. 19 out of 197 IBD industry groups. The impact of President Trump's tariff-based trade policies are a wild...

June 25, 2025 07:00 AM
Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace

This report is the first to conduct a comparative study within the international offensive cyber supply chain, comparing the United States' fragmented, risk-...

June 12, 2025 07:00 AM
Cybersecurity and Credit Union System Resilience Annual Report to Congress

MESSAGE FROM THE CHAIRMAN On behalf of the National Credit Union Administration (NCUA), I am submitting our annual, statutorily required...

April 16, 2025 07:00 AM
CISA extends MITRE-backed CVE contract hours before its lapse

The Cybersecurity and Infrastructure Security Agency extended its contract for the MITRE-backed Common Vulnerabilities and Exposures Program late Tuesday night.

March 11, 2025 07:00 AM
Article | Red team workers for nation’s cyber agency laid off as part of DOGE cuts

Among the workers laid off amid cuts to the nation's cyber agency are dozens of contractors who work on so-called red teams whose job is...

December 26, 2024 08:00 AM
Texas awards $170M contract to SAIC for IT, cybersecurity services

Texas' Department of Information Resources has awarded a $170.9 million contract to technology integrator firm Science Applications International Corporation,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CSG CyberSecurity History Information

Official Website of Contract Source Group

The official website of Contract Source Group is http://www.csgreps.com.

Contract Source Group’s AI-Generated Cybersecurity Score

According to Rankiteo, Contract Source Group’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Contract Source Group’ have ?

According to Rankiteo, Contract Source Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Contract Source Group have SOC 2 Type 1 certification ?

According to Rankiteo, Contract Source Group is not certified under SOC 2 Type 1.

Does Contract Source Group have SOC 2 Type 2 certification ?

According to Rankiteo, Contract Source Group does not hold a SOC 2 Type 2 certification.

Does Contract Source Group comply with GDPR ?

According to Rankiteo, Contract Source Group is not listed as GDPR compliant.

Does Contract Source Group have PCI DSS certification ?

According to Rankiteo, Contract Source Group does not currently maintain PCI DSS compliance.

Does Contract Source Group comply with HIPAA ?

According to Rankiteo, Contract Source Group is not compliant with HIPAA regulations.

Does Contract Source Group have ISO 27001 certification ?

According to Rankiteo,Contract Source Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Contract Source Group

Contract Source Group operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at Contract Source Group

Contract Source Group employs approximately 10 people worldwide.

Subsidiaries Owned by Contract Source Group

Contract Source Group presently has no subsidiaries across any sectors.

Contract Source Group’s LinkedIn Followers

Contract Source Group’s official LinkedIn profile has approximately 799 followers.

NAICS Classification of Contract Source Group

Contract Source Group is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.

Contract Source Group’s Presence on Crunchbase

No, Contract Source Group does not have a profile on Crunchbase.

Contract Source Group’s Presence on LinkedIn

Yes, Contract Source Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/contract-source-group.

Cybersecurity Incidents Involving Contract Source Group

As of November 28, 2025, Rankiteo reports that Contract Source Group has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Contract Source Group has an estimated 2,617 peer or competitor companies worldwide.

Contract Source Group CyberSecurity History Information

How many cyber incidents has Contract Source Group faced ?

Total Incidents: According to Rankiteo, Contract Source Group has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Contract Source Group ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=contract-source-group' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge