ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Our Story In 1996, Door to Door revolutionized the self-storage industry by introducing portable, containerized storage in Seattle, Washington. The idea caught on quickly on the West Coast, and today Door to Door serves numerous metropolitan areas across the nation. In 1999, we took the logical next step and began offering self-service moving to our customers with the same commitment to exceeding their expectations. Today, Door to Door’s corporate headquarters is located 20 miles south of Seattle in Kent, Washington. Some companies have chosen to copy our product as closely as possible, while others claim that they have a better container. In either case, they all struggle to match our industry leading customer satisfaction ratings and enviable record of protecting possessions. We are committed to delivering quality moving and storage solutions as well as the kind of Exceptional Customer Care you will recommend to your friends and family. Through all of your life transitions, we’ll be here to take care of you.

Door to Door Storage, Inc. A.I CyberSecurity Scoring

DDSI

Company Details

Linkedin ID:

door-to-door-storage

Employees number:

63

Number of followers:

639

NAICS:

None

Industry Type:

Warehousing

Homepage:

doortodoor.com

IP Addresses:

0

Company ID:

DOO_1917155

Scan Status:

In-progress

AI scoreDDSI Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/door-to-door-storage.jpeg
DDSI Warehousing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreDDSI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/door-to-door-storage.jpeg
DDSI Warehousing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

DDSI Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

DDSI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for DDSI

Incidents vs Warehousing Industry Average (This Year)

No incidents recorded for Door to Door Storage, Inc. in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Door to Door Storage, Inc. in 2025.

Incident Types DDSI vs Warehousing Industry Avg (This Year)

No incidents recorded for Door to Door Storage, Inc. in 2025.

Incident History — DDSI (X = Date, Y = Severity)

DDSI cyber incidents detection timeline including parent company and subsidiaries

DDSI Company Subsidiaries

SubsidiaryImage

Our Story In 1996, Door to Door revolutionized the self-storage industry by introducing portable, containerized storage in Seattle, Washington. The idea caught on quickly on the West Coast, and today Door to Door serves numerous metropolitan areas across the nation. In 1999, we took the logical next step and began offering self-service moving to our customers with the same commitment to exceeding their expectations. Today, Door to Door’s corporate headquarters is located 20 miles south of Seattle in Kent, Washington. Some companies have chosen to copy our product as closely as possible, while others claim that they have a better container. In either case, they all struggle to match our industry leading customer satisfaction ratings and enviable record of protecting possessions. We are committed to delivering quality moving and storage solutions as well as the kind of Exceptional Customer Care you will recommend to your friends and family. Through all of your life transitions, we’ll be here to take care of you.

Loading...
similarCompanies

DDSI Similar Companies

Dynamic 3PL

Dynamic 3PL provides the full range of warehousing and transportation management services with a focus on cost-effective and value-added solutions to meet your more complex logistics needs. We use the latest technology to assure orders are processed efficiently and to provide you with real-time acc

NewRoads Distribution, LLC

NewRoads Distribution, LLC is a full service warehousing, distribution and logistical center located in southern New Hampshire. We offer a full array of services designed to provide an efficient and cost effective storage and distribution solution. Our professional staff is trained to handle the hig

GUARDABOX

Guardabox® es un centro de Auto Almacenaje, donde podrás almacenar todos tus bienes, archivo muerto, menajes domésticos, herramientas, etc. Ventajas: - Vigilancia las 24 horas los 365 días del año. - Cada cliente coloca su propio candado y conserva su llave. - Acceso a tu mini bodega

Kenwood Records Management

Kenwood Records Management is a professional records management center with more than 30 years of experience managing millions of documents and data files for some of the largest industries in Iowa, including: healthcare, insurance, law, financial, government, information solutions, food processing,

A-1 Quality Logistical Solutions, LLC

A1 offers a unique variety of labor services and solutions which include on-site workers and project teams at a fixed cost. We provide unloading services and offer a wide range of warehouse labor solutions. Our service offerings include a full line of shipping and receiving models, order selection

Georgetown Terminal Warehouses Limited

Georgetown Terminal Warehouses Limited was founded in 1964 by John Elliott, the father of the present owner, Brenda Sisnett. GTW has grown to be a major player in the book distribution industry helping publishers grow their business by providing excellence in communication, problem solving, knowledg

newsone

DDSI CyberSecurity News

October 27, 2025 07:00 AM
Critical Dell Storage Flaws Expose Systems to Attack

Severe bugs in Dell Storage Manager let hackers bypass authentication and gain remote access. Patch now to secure enterprise storage...

October 11, 2025 07:00 AM
New 7-Zip high-severity vulnerabilities expose systems to remote attackers — users should update to version 25 ASAP

Two newly disclosed vulnerabilities in 7-Zip could allow attackers to execute arbitrary code by tricking users into opening a malicious ZIP...

October 09, 2025 07:00 AM
Microsoft Azure Faces Global Outage Impacting Services Worldwide

The incident, which began at approximately 07:40 UTC, was traced to a major capacity loss within Azure Front Door (AFD), the company's...

July 30, 2025 07:00 AM
The food supply chain has a cybersecurity problem

Explore the rising cyber threats facing the agri-food sector and why cybersecurity is critical for protecting our food supply chain.

July 24, 2025 07:00 AM
Safeguarding Critical Infrastructure: Key Challenges in Global Cybersecurity

Fueled by AI and rising state-sponsored threats, cyberattacks on critical infrastructure have become more frequent and sophisticated,...

July 15, 2025 07:00 AM
Blue Door AM I Announces Launch of $64.8 Million DST Offering

LADERA RANCH, Calif., July 15, 2025--Blue Door AM I, LLC, an indirect subsidiary of Strategic Storage Growth Trust III, Inc. ("SSGT III"),...

May 20, 2025 07:00 AM
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to...

May 14, 2025 07:00 AM
Rogue communication devices found in Chinese solar power inverters

U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure...

April 15, 2025 07:00 AM
A whistleblower's disclosure details how DOGE may have taken sensitive labor data

The DOGE team may have taken data related to union organizing and labor complaints and hid its tracks, according to a whistleblower.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

DDSI CyberSecurity History Information

Official Website of Door to Door Storage, Inc.

The official website of Door to Door Storage, Inc. is http://www.doortodoor.com.

Door to Door Storage, Inc.’s AI-Generated Cybersecurity Score

According to Rankiteo, Door to Door Storage, Inc.’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.

How many security badges does Door to Door Storage, Inc.’ have ?

According to Rankiteo, Door to Door Storage, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Door to Door Storage, Inc. have SOC 2 Type 1 certification ?

According to Rankiteo, Door to Door Storage, Inc. is not certified under SOC 2 Type 1.

Does Door to Door Storage, Inc. have SOC 2 Type 2 certification ?

According to Rankiteo, Door to Door Storage, Inc. does not hold a SOC 2 Type 2 certification.

Does Door to Door Storage, Inc. comply with GDPR ?

According to Rankiteo, Door to Door Storage, Inc. is not listed as GDPR compliant.

Does Door to Door Storage, Inc. have PCI DSS certification ?

According to Rankiteo, Door to Door Storage, Inc. does not currently maintain PCI DSS compliance.

Does Door to Door Storage, Inc. comply with HIPAA ?

According to Rankiteo, Door to Door Storage, Inc. is not compliant with HIPAA regulations.

Does Door to Door Storage, Inc. have ISO 27001 certification ?

According to Rankiteo,Door to Door Storage, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Door to Door Storage, Inc.

Door to Door Storage, Inc. operates primarily in the Warehousing industry.

Number of Employees at Door to Door Storage, Inc.

Door to Door Storage, Inc. employs approximately 63 people worldwide.

Subsidiaries Owned by Door to Door Storage, Inc.

Door to Door Storage, Inc. presently has no subsidiaries across any sectors.

Door to Door Storage, Inc.’s LinkedIn Followers

Door to Door Storage, Inc.’s official LinkedIn profile has approximately 639 followers.

Door to Door Storage, Inc.’s Presence on Crunchbase

No, Door to Door Storage, Inc. does not have a profile on Crunchbase.

Door to Door Storage, Inc.’s Presence on LinkedIn

Yes, Door to Door Storage, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/door-to-door-storage.

Cybersecurity Incidents Involving Door to Door Storage, Inc.

As of December 21, 2025, Rankiteo reports that Door to Door Storage, Inc. has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Door to Door Storage, Inc. has an estimated 167 peer or competitor companies worldwide.

Door to Door Storage, Inc. CyberSecurity History Information

How many cyber incidents has Door to Door Storage, Inc. faced ?

Total Incidents: According to Rankiteo, Door to Door Storage, Inc. has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Door to Door Storage, Inc. ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.

Risk Information
cvss3
Base: 7.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Description

The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=door-to-door-storage' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge