Comparison Overview

Dala Decor

VS

Storr Office Environments

Dala Decor

1790 Woodward Drive, Ottawa, ON, K2C0P7, CA
Last Update: 2025-11-26
Between 750 and 799

Welcome to Dala Decor, Furniture Store and Custom Design House. Our flagship showroom was founded in 2017 when we were looking to bridge the gap for designers and consumers by creating a space for people to explore their design style and feel assured that their wants and needs are heard. Sourcing a highly curated selection of pieces from suppliers and manufacturers both domestically and abroad, we aim to deliver premium products and services to our community. Need help? Text us at 613-209-5207.

NAICS: 337
NAICS Definition:
Employees: 14
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Storr Office Environments

10800 World Trade Boulevard, Raleigh, NC, 27617, US
Last Update: 2025-11-21
Between 700 and 749

As your single source for working spaces, Storr provides new office furniture and related services, used office furniture, repair and refurbishment, flooring, move services, records management, and vault storage. Our goal: to help you create your working space to support your business objectives. Whether you work in a bank or a research laboratory, a college classroom or a healthcare clinic, Storr has the knowledge, products and services to make your space work for you.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 197
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dala-decor.jpeg
Dala Decor
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/storr-office-environments.jpeg
Storr Office Environments
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Dala Decor
100%
Compliance Rate
0/4 Standards Verified
Storr Office Environments
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Dala Decor in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Storr Office Environments in 2025.

Incident History — Dala Decor (X = Date, Y = Severity)

Dala Decor cyber incidents detection timeline including parent company and subsidiaries

Incident History — Storr Office Environments (X = Date, Y = Severity)

Storr Office Environments cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dala-decor.jpeg
Dala Decor
Incidents

No Incident

https://images.rankiteo.com/companyimages/storr-office-environments.jpeg
Storr Office Environments
Incidents

Date Detected: 5/2024
Type:Breach
Blog: Blog

FAQ

Dala Decor company demonstrates a stronger AI Cybersecurity Score compared to Storr Office Environments company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Storr Office Environments company has historically faced a number of disclosed cyber incidents, whereas Dala Decor company has not reported any.

In the current year, Storr Office Environments company and Dala Decor company have not reported any cyber incidents.

Neither Storr Office Environments company nor Dala Decor company has reported experiencing a ransomware attack publicly.

Storr Office Environments company has disclosed at least one data breach, while Dala Decor company has not reported such incidents publicly.

Neither Storr Office Environments company nor Dala Decor company has reported experiencing targeted cyberattacks publicly.

Neither Dala Decor company nor Storr Office Environments company has reported experiencing or disclosing vulnerabilities publicly.

Neither Dala Decor nor Storr Office Environments holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Dala Decor company nor Storr Office Environments company has publicly disclosed detailed information about the number of their subsidiaries.

Storr Office Environments company employs more people globally than Dala Decor company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither Dala Decor nor Storr Office Environments holds SOC 2 Type 1 certification.

Neither Dala Decor nor Storr Office Environments holds SOC 2 Type 2 certification.

Neither Dala Decor nor Storr Office Environments holds ISO 27001 certification.

Neither Dala Decor nor Storr Office Environments holds PCI DSS certification.

Neither Dala Decor nor Storr Office Environments holds HIPAA certification.

Neither Dala Decor nor Storr Office Environments holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.