Company Details
crossmark
9,463
63,879
5416
crossmark.com
0
CRO_2090980
In-progress

CROSSMARK Company CyberSecurity Posture
crossmark.comCrossmark offers service-based solutions to help your brand grow in store and online. With the sales and marketing expertise at our disposal, we can provide you with the ultimate end-to-end service. That means better decision making, actionable insights, unearthing exciting new retail opportunities, and giving you an instant understanding of your current and future performance.
Company Details
crossmark
9,463
63,879
5416
crossmark.com
0
CRO_2090980
In-progress
Between 700 and 749

CROSSMARK Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported a data breach involving Crossmark, Inc. on April 15, 2024. The breach occurred on March 15, 2024, due to an inadvertent disclosure of personal information, specifically a spreadsheet containing names and Social Security numbers, affecting a total of 1,295 individuals.


No incidents recorded for CROSSMARK in 2025.
No incidents recorded for CROSSMARK in 2025.
No incidents recorded for CROSSMARK in 2025.
CROSSMARK cyber incidents detection timeline including parent company and subsidiaries

Crossmark offers service-based solutions to help your brand grow in store and online. With the sales and marketing expertise at our disposal, we can provide you with the ultimate end-to-end service. That means better decision making, actionable insights, unearthing exciting new retail opportunities, and giving you an instant understanding of your current and future performance.


Capgemini Invent is the digital innovation, consulting and transformation brand of the Capgemini Group, a global business line that combines market leading expertise in strategy, technology, data science and creative design, to help CxOs envision and build what’s next for their businesses. For more
Choosing a digital partner is about more than capabilities — it’s about collaboration and character. Unrealistic overhauls and off-the-shelf products ignore what matters most — your unique needs, culture, goals, and your legacy data and technology environments. At EXL, our collaboration is built o

Wisdom, the ability to apply knowledge to the real world with discernment, is critical for today’s enterprise. However, wisdom becomes available to the enterprise after the iterative application of knowledge to multiple long-tail experiments. Straive helps clients operationalize the Data →Insights

Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. We team with leaders who expect more. So we bring more. From strategy through delivery, our agile teams across 53 offices in 12 countries collaborate with you to
Applus+ is a worldwide leader in the testing, inspection, and certification sector. We are a trusted partner, enhancing the quality and safety of our clients’ assets and infrastructures while safeguarding their operations and improving their environmental performance. Our innovative approach, techni

KPMG entities in India are established under the laws of India and are owned and managed (as the case may be) by established Indian professionals. Established in September 1993, the KPMG entities have rapidly built a significant competitive presence in the country. Today we operate from offices acro

ZS is a management consulting and technology firm that partners with companies to improve life and how we live it. We transform ideas into impact by bringing together data, science, technology and human ingenuity to deliver better outcomes for all. Founded in 1983, ZS has more than 13,000 employees

Global Tech Consulting Company All in One. Stefanini is a Brazilian multinational company with 37 years of experience and presence in 41 countries. With more than 35,000 employees, we co-create solutions for a better future, driving digital transformation with a focus on real results. We oper

At Advantage Solutions, we're the unseen architects behind your everyday purchases. From pantry staples to your online shopping carts, we ensure your favorite goods are always in stock and within reach by connecting manufacturers to the right retailers and teaming up with retailers to figure out the
.png)
Crossmark Global Investments has entered the ETF space with two actively managed exchange-traded funds — Crossmark Large Cap Growth ETF...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CROSSMARK is http://www.crossmark.com.
According to Rankiteo, CROSSMARK’s AI-generated cybersecurity score is 726, reflecting their Moderate security posture.
According to Rankiteo, CROSSMARK currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CROSSMARK is not certified under SOC 2 Type 1.
According to Rankiteo, CROSSMARK does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CROSSMARK is not listed as GDPR compliant.
According to Rankiteo, CROSSMARK does not currently maintain PCI DSS compliance.
According to Rankiteo, CROSSMARK is not compliant with HIPAA regulations.
According to Rankiteo,CROSSMARK is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CROSSMARK operates primarily in the Business Consulting and Services industry.
CROSSMARK employs approximately 9,463 people worldwide.
CROSSMARK presently has no subsidiaries across any sectors.
CROSSMARK’s official LinkedIn profile has approximately 63,879 followers.
CROSSMARK is classified under the NAICS code 5416, which corresponds to Management, Scientific, and Technical Consulting Services.
No, CROSSMARK does not have a profile on Crunchbase.
Yes, CROSSMARK maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crossmark.
As of December 27, 2025, Rankiteo reports that CROSSMARK has experienced 1 cybersecurity incidents.
CROSSMARK has an estimated 18,530 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Crossmark, Inc.
Description: The Maine Office of the Attorney General reported a data breach involving Crossmark, Inc. on April 15, 2024. The breach occurred on March 15, 2024, due to an inadvertent disclosure of personal information, specifically a spreadsheet containing names and Social Security numbers, affecting a total of 1,295 individuals.
Date Detected: 2024-03-15
Date Publicly Disclosed: 2024-04-15
Type: Data Breach
Attack Vector: Inadvertent Disclosure
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers and .

Entity Name: Crossmark, Inc.
Entity Type: Company
Customers Affected: 1295

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 1295
Sensitivity of Data: High
File Types Exposed: Spreadsheet

Source: Maine Office of the Attorney General
Date Accessed: 2024-04-15
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-04-15.
Most Recent Incident Detected: The most recent incident detected was on 2024-03-15.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and Social Security numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 134.0.
Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.
.png)
A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability affects the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart results in buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects the function strcpy of the file /goform/APSecurity. The manipulation of the argument wepkey1 leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
A vulnerability was detected in ketr JEPaaS up to 7.2.8. Affected by this vulnerability is the function postilService.loadPostils of the file /je/postil/postil/loadPostil. Performing manipulation of the argument keyWord results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
A security vulnerability has been detected in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function submitOrderPayment of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. Such manipulation of the argument orderSn leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about this disclosure but did not respond in any way.
A weakness has been identified in youlaitech youlai-mall 1.0.0/2.0.0. This impacts the function getMemberByMobile of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java. This manipulation causes improper access controls. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.