ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Crown Publications is a business-to-business trade publications company that was founded in 1986 by Jenny Warwick when she launched Electricity SA. Since then it has become one of the largest business-to-business publishing companies in South Africa with ten monthly titles and four quarterlies covering all areas of engineering. Crown also produces five additional titles on behalf of various clients and associations related to the industries it targets. Many of our editors are seasoned trade journalists with years of experience in their fields. They are supported by qualified engineers who help them ensure that the technical detail covered in the journals is accurate, current and relevant to our readers. Our lay-out artists, sales and admin teams ensure that, month after month, we maintain the high standard of our glossy, up-market publications.

Crown Publications A.I CyberSecurity Scoring

Crown Publications

Company Details

Linkedin ID:

crown-publications

Employees number:

49

Number of followers:

2,521

NAICS:

511

Industry Type:

Book and Periodical Publishing

Homepage:

crown.co.za

IP Addresses:

0

Company ID:

CRO_7004425

Scan Status:

In-progress

AI scoreCrown Publications Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/crown-publications.jpeg
Crown Publications Book and Periodical Publishing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCrown Publications Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/crown-publications.jpeg
Crown Publications Book and Periodical Publishing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Crown Publications Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Crown Publications Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Crown Publications

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Crown Publications in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Crown Publications in 2025.

Incident Types Crown Publications vs Book and Periodical Publishing Industry Avg (This Year)

No incidents recorded for Crown Publications in 2025.

Incident History — Crown Publications (X = Date, Y = Severity)

Crown Publications cyber incidents detection timeline including parent company and subsidiaries

Crown Publications Company Subsidiaries

SubsidiaryImage

Crown Publications is a business-to-business trade publications company that was founded in 1986 by Jenny Warwick when she launched Electricity SA. Since then it has become one of the largest business-to-business publishing companies in South Africa with ten monthly titles and four quarterlies covering all areas of engineering. Crown also produces five additional titles on behalf of various clients and associations related to the industries it targets. Many of our editors are seasoned trade journalists with years of experience in their fields. They are supported by qualified engineers who help them ensure that the technical detail covered in the journals is accurate, current and relevant to our readers. Our lay-out artists, sales and admin teams ensure that, month after month, we maintain the high standard of our glossy, up-market publications.

Loading...
similarCompanies

Crown Publications Similar Companies

Joggling Board Press

Joggling Board Press is a Charleston-based independent publishing company dedicated to the production of fiction and non-fiction books of quality that amplify the history, culture and character of the American southeast. The press was founded in 2003 by award-winning author Susan Kammeraad-Campbe

West Academic

West Academic is the leading publisher of casebooks, treatises, study aids and other legal education materials in the US. West Academic Publishing provides its products under the West Academic Publishing, Foundation Press and Gilbert imprints. We are a growth-oriented organization, dedicated to pro

Chicago Style Weddings

Chicago Style Weddings is the midwest's best and most comprehensive wedding resource in the industry. Our goal is to provide couples and their families with the most up-to-date information and ideas while making sure the basics are available to keep you on track and organized. We also pride ourselv

Management Roundtable

The Management Roundtable (MRT) is the leading content and networking resource for product developers and innovation leaders. Practitioner-oriented and unbiased, our focus is on providing actionable insights about new strategies and processes that enable corporate growth, agility, resilience, and ov

Rochester Catholic Press Assn. d/b/a Catholic Courier and El Mensajero Catolico newspapers

The Rochester Catholic Press Association, Inc., is publisher of the print-and-digital Catholic Courier and the web-based El Mensajero Católico. Both focus their coverage on news and features about the Roman Catholic Diocese of Rochester, NY, spanning 12-counties in west-central New York. The Courie

Fantagraphics Books

For over 40 years, Fantagraphics Books has published the very best comics and graphic novels that the medium has to offer. Our mission is to celebrate great cartooning in all of its incarnations, from the form’s early luminaries to contemporary artists currently forging the future of visual storytel

newsone

Crown Publications CyberSecurity News

October 26, 2025 07:50 PM
Digital Crown Jewels - It's a High Stakes Game

Companies are increasingly relying on digital assets to drive growth as part of digital transformations."Digital Crown Jewels" or DCJ are the most valuable...

October 03, 2025 07:00 AM
NIST publication warns that USB devices pose serious cybersecurity threats to ICS, offers guidance for mitigation

The U.S. National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE),...

October 02, 2025 04:58 AM
US SEC charges SolarWinds and its CISO for alleged cybersecurity misstatements and controls failures

The SEC recently announced charges against software company SolarWinds Corporation and its CISO for allegedly making material misstatements regarding its...

September 19, 2025 07:00 AM
Cyber security skills in the UK labour market 2025

I am delighted to present the 2025 findings report on cyber security skills in the UK labour market. This report, conducted by Ipsos and...

April 08, 2025 07:00 AM
Cyber Governance Code of Practice

The Cyber Governance Code of Practice (the Code) has been created to support boards and directors in governing cyber security risks.

March 10, 2025 07:00 AM
Cyber security sectoral analysis 2025

This year's analysis demonstrates exceptional performance, with the sector's contribution to our economy reaching new heights – generating £13.2 billion in...

July 25, 2024 07:00 AM
Beazley Leads Cyber Insurance Market Amid Sector Challenges

Beazley ranks first in global cyber insurance market, but at a time of increasing attacks, expanding attack surfaces and even a global IT...

March 20, 2024 07:00 AM
Cyber security longitudinal survey - wave three

This report covers the findings from the third wave of a multi-year survey, including comparisons to previous waves of the research.

March 04, 2024 08:00 AM
A human-led and tech-enabled cybersecurity function

In today's rapidly evolving digital landscape, it has become imperative for organisations to establish a mature cybersecurity function to...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Crown Publications CyberSecurity History Information

Official Website of Crown Publications

The official website of Crown Publications is http://www.crown.co.za.

Crown Publications’s AI-Generated Cybersecurity Score

According to Rankiteo, Crown Publications’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.

How many security badges does Crown Publications’ have ?

According to Rankiteo, Crown Publications currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Crown Publications have SOC 2 Type 1 certification ?

According to Rankiteo, Crown Publications is not certified under SOC 2 Type 1.

Does Crown Publications have SOC 2 Type 2 certification ?

According to Rankiteo, Crown Publications does not hold a SOC 2 Type 2 certification.

Does Crown Publications comply with GDPR ?

According to Rankiteo, Crown Publications is not listed as GDPR compliant.

Does Crown Publications have PCI DSS certification ?

According to Rankiteo, Crown Publications does not currently maintain PCI DSS compliance.

Does Crown Publications comply with HIPAA ?

According to Rankiteo, Crown Publications is not compliant with HIPAA regulations.

Does Crown Publications have ISO 27001 certification ?

According to Rankiteo,Crown Publications is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Crown Publications

Crown Publications operates primarily in the Book and Periodical Publishing industry.

Number of Employees at Crown Publications

Crown Publications employs approximately 49 people worldwide.

Subsidiaries Owned by Crown Publications

Crown Publications presently has no subsidiaries across any sectors.

Crown Publications’s LinkedIn Followers

Crown Publications’s official LinkedIn profile has approximately 2,521 followers.

NAICS Classification of Crown Publications

Crown Publications is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).

Crown Publications’s Presence on Crunchbase

No, Crown Publications does not have a profile on Crunchbase.

Crown Publications’s Presence on LinkedIn

Yes, Crown Publications maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crown-publications.

Cybersecurity Incidents Involving Crown Publications

As of November 28, 2025, Rankiteo reports that Crown Publications has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Crown Publications has an estimated 4,881 peer or competitor companies worldwide.

Crown Publications CyberSecurity History Information

How many cyber incidents has Crown Publications faced ?

Total Incidents: According to Rankiteo, Crown Publications has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Crown Publications ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=crown-publications' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge