Company Details
contract-source-group
10
799
337
csgreps.com
0
CON_5320515
In-progress

Contract Source Group Company CyberSecurity Posture
csgreps.comContract Source Group was established in Michigan and remains a proud Michigan company located in Bloomfield Hills. CSG is a customer-driven representative of several different contract furniture and textiles manufacturers for commercial, healthcare, hospitality, education, community, and office markets. We are focused and driven on relationships - with our manufactures, dealers, A & D firms, community and team, gaining integrity and trust at each level. How can we help you?
Company Details
contract-source-group
10
799
337
csgreps.com
0
CON_5320515
In-progress
Between 750 and 799

CSG Global Score (TPRM)XXXX



No incidents recorded for Contract Source Group in 2025.
No incidents recorded for Contract Source Group in 2025.
No incidents recorded for Contract Source Group in 2025.
CSG cyber incidents detection timeline including parent company and subsidiaries

Contract Source Group was established in Michigan and remains a proud Michigan company located in Bloomfield Hills. CSG is a customer-driven representative of several different contract furniture and textiles manufacturers for commercial, healthcare, hospitality, education, community, and office markets. We are focused and driven on relationships - with our manufactures, dealers, A & D firms, community and team, gaining integrity and trust at each level. How can we help you?


We are Restwell Sleep Products, a fast growing privately owned and operated manufacturer and distributor of mattresses, foundations and other related sleep products. Restwell Sleep Products began as a small family run operation in 1990. Today, we are one of Western Canada’s largest privately owned m
At Vermont Farm table we specialize in premium solid wood tables and seating for commercial and residential projects. Design is at the center if our work at Vermont Farm Table. Everything we build is an intentional balance between beauty and function, brought to life using premium materials. We over

Best Buy Furniture has been doing business around the east coast since 2001.We have been serving the cherry hill , Pennsylvania , Camden , Philadelphia and the rest of the area for the past years with the best service and prices. Our specialty is our buying power. While most retail stores charge nor

Over the last century, Herman Miller has been guided by a commitment to problem-solving designs that inspire the best in people. Along the way, Herman Miller has forged critical relationships with the most visionary designers of the day, from mid-century greats like George Nelson, the Eames Office,

Nexus Interiors Australia connects businesses, employees and all end users with furniture solutions that are beautifully designed, easy to use and cost effective. Current preferred suppliers to all municipalities in Victoria and Tasmania, Catholic Education of Melbourne, various universities and a

When you think about English Georgian America, think best design, best quality and best price. This is our promise to you and our guiding principle when creating our pieces or selecting something for our in-stock program. We will work hard to earn your business whether you're furnishing your home, o
.png)
On September 10, 2025, the U.S. Department of Defense (DoD) published a final rule that will shake up cybersecurity compliance for DoD...
These companies block online threats, assess industry vulnerabilities and increase education and awareness about cybersecurity.
Cencora, The Lash Group, and their affiliates have agreed to pay $40 million to settle class action data breach litigation over a February...
Cybersecurity stocks rank No. 19 out of 197 IBD industry groups. The impact of President Trump's tariff-based trade policies are a wild...
This report is the first to conduct a comparative study within the international offensive cyber supply chain, comparing the United States' fragmented, risk-...
MESSAGE FROM THE CHAIRMAN On behalf of the National Credit Union Administration (NCUA), I am submitting our annual, statutorily required...
The Cybersecurity and Infrastructure Security Agency extended its contract for the MITRE-backed Common Vulnerabilities and Exposures Program late Tuesday night.
Among the workers laid off amid cuts to the nation's cyber agency are dozens of contractors who work on so-called red teams whose job is...
Texas' Department of Information Resources has awarded a $170.9 million contract to technology integrator firm Science Applications International Corporation,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Contract Source Group is http://www.csgreps.com.
According to Rankiteo, Contract Source Group’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Contract Source Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Contract Source Group is not certified under SOC 2 Type 1.
According to Rankiteo, Contract Source Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Contract Source Group is not listed as GDPR compliant.
According to Rankiteo, Contract Source Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Contract Source Group is not compliant with HIPAA regulations.
According to Rankiteo,Contract Source Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Contract Source Group operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Contract Source Group employs approximately 10 people worldwide.
Contract Source Group presently has no subsidiaries across any sectors.
Contract Source Group’s official LinkedIn profile has approximately 799 followers.
Contract Source Group is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Contract Source Group does not have a profile on Crunchbase.
Yes, Contract Source Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/contract-source-group.
As of November 28, 2025, Rankiteo reports that Contract Source Group has not experienced any cybersecurity incidents.
Contract Source Group has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Contract Source Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.