Company Details
csi-ergonomics
5
106
337
csiergonomics.com
0
CSI_2350306
In-progress

CSI Ergonomics Company CyberSecurity Posture
csiergonomics.comCombining innovative products with a unique understanding of the human form, CSI has emerged at the forefront of workplace ergonomics. In addition to offering a wide array of ergonomic products and solutions, CSI provides personal consultations in our showroom, "The Comfort Zone", as well as onsite workplace evaluations, training support and referrals, and product delivery and installation. As we continue to expand and evolve, CSI will remain true to our philosophy that "it pays to be comfortable." CSI (originally Clinic Supply, Inc.) began in 1991 as a distributor of orthopedic and health rehabilitation products. While the company's initial focus quickly took hold within the healthcare community, our passion and expertise soon grew to encompass the broad field of occupational health and safety. CSI discovered purpose not only in helping individuals who had sustained workplace injuries, but also in finding new ways to prevent such injuries from occurring. A Few Of Our Clients: St.Paul Travelers Dorsey and Whitney LLP HealthPartners US Bank Toro State of Minnesota ...and many more..
Company Details
csi-ergonomics
5
106
337
csiergonomics.com
0
CSI_2350306
In-progress
Between 750 and 799

CSI Ergonomics Global Score (TPRM)XXXX



No incidents recorded for CSI Ergonomics in 2025.
No incidents recorded for CSI Ergonomics in 2025.
No incidents recorded for CSI Ergonomics in 2025.
CSI Ergonomics cyber incidents detection timeline including parent company and subsidiaries

Combining innovative products with a unique understanding of the human form, CSI has emerged at the forefront of workplace ergonomics. In addition to offering a wide array of ergonomic products and solutions, CSI provides personal consultations in our showroom, "The Comfort Zone", as well as onsite workplace evaluations, training support and referrals, and product delivery and installation. As we continue to expand and evolve, CSI will remain true to our philosophy that "it pays to be comfortable." CSI (originally Clinic Supply, Inc.) began in 1991 as a distributor of orthopedic and health rehabilitation products. While the company's initial focus quickly took hold within the healthcare community, our passion and expertise soon grew to encompass the broad field of occupational health and safety. CSI discovered purpose not only in helping individuals who had sustained workplace injuries, but also in finding new ways to prevent such injuries from occurring. A Few Of Our Clients: St.Paul Travelers Dorsey and Whitney LLP HealthPartners US Bank Toro State of Minnesota ...and many more..


When we began Berkeley Mills in 1988, we had disparate backgrounds and experiences in woodworking, but we shared a common goal: to make furniture and kitchens of such enduring design and quality that it transforms one's surroundings by adding sophistication, serenity, beauty and comfort to the envir

IJF Australia is the national market leader in the contract joinery industry specializing in design, manufacture, procurement, installation and project management of interior joinery. Family values have always been at the heart of IJF from its establishment in 1964. Joinery and furniture manuf

Stylex, an American design brand founded in 1956 by the Golden family, has a proud legacy of crafting enduring furniture with a focus on innovation, material expertise, and design excellence. Now a part of the Flokk family—a European market leader in high-quality seating solutions—Stylex continues t

At Transformations, we believe that you should never have to choose between beautiful design and a functional solution. It’s possible to have both. With more than 40 years of experience making seating for the most demanding environments (and 20+ years dedicated to the education/commercial market),

With over 40 years' experience,he Emuca Group designs, manufactures and sells a wide range of products for the furniture, carpentry, hardware and DIY sectors. We want to be close to our clients and that is why we have different subsidiaries throughout Europe. Our commercial headquarters in Valenci

Since 1986, Custom Comfort Mattress has been building mattresses the old-fashioned way, using traditional construction methods and natural materials. We are a family business trusted by generations of families. We don’t take shortcuts. We go the long way. We build handcrafted, double-sided, natural
.png)
Launched nationwide in 2024, the Digital and Intelligence Service (DIS) Sentinel Programme aims to equip our youths with cybersecurity and...
IQSTEL and Cycurion Enter New Era of AI-Cybersecurity Putting Customers First. Vancouver, Kelowna, and Delta, British Columbia--(Newsfile...
IQSTEL (NASDAQ: IQST) and Cycurion announced Phase One completion of a joint AI-cybersecurity program on November 28, 2025,...
A report released by the U.S. Department of Health and Human Services (HHS) Office of Inspector General revealed that the National...
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.
White Pearl Technology Group AB announced the successful integration of recent acquisitions in smart infrastructure, the establishment of a...
The programme will be delivered across India through a hybrid model, combining direct engagement with universities and collaboration with...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CSI Ergonomics is https://www.csiergonomics.com.
According to Rankiteo, CSI Ergonomics’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, CSI Ergonomics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CSI Ergonomics is not certified under SOC 2 Type 1.
According to Rankiteo, CSI Ergonomics does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CSI Ergonomics is not listed as GDPR compliant.
According to Rankiteo, CSI Ergonomics does not currently maintain PCI DSS compliance.
According to Rankiteo, CSI Ergonomics is not compliant with HIPAA regulations.
According to Rankiteo,CSI Ergonomics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CSI Ergonomics operates primarily in the Furniture and Home Furnishings Manufacturing industry.
CSI Ergonomics employs approximately 5 people worldwide.
CSI Ergonomics presently has no subsidiaries across any sectors.
CSI Ergonomics’s official LinkedIn profile has approximately 106 followers.
No, CSI Ergonomics does not have a profile on Crunchbase.
Yes, CSI Ergonomics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/csi-ergonomics.
As of November 28, 2025, Rankiteo reports that CSI Ergonomics has not experienced any cybersecurity incidents.
CSI Ergonomics has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CSI Ergonomics has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.