Company Details
eccentrix
9
2,767
6115
eccentrix.ca
0
ECC_2879485
In-progress

Eccentrix Company CyberSecurity Posture
eccentrix.caSince 2011, Eccentrix has been providing technology skills enhancement solutions for businesses. Our mission is to promote the importance of continuing education to computer users and professionals through many programs that we have implemented and improved over the years. Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, PeopleCert and PECB. Our corporate clientele is made up of private firms, non-profit organizations, government departments and social service centres, municipalities and educational establishments.
Company Details
eccentrix
9
2,767
6115
eccentrix.ca
0
ECC_2879485
In-progress
Between 750 and 799

Eccentrix Global Score (TPRM)XXXX



No incidents recorded for Eccentrix in 2025.
No incidents recorded for Eccentrix in 2025.
No incidents recorded for Eccentrix in 2025.
Eccentrix cyber incidents detection timeline including parent company and subsidiaries

Since 2011, Eccentrix has been providing technology skills enhancement solutions for businesses. Our mission is to promote the importance of continuing education to computer users and professionals through many programs that we have implemented and improved over the years. Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, PeopleCert and PECB. Our corporate clientele is made up of private firms, non-profit organizations, government departments and social service centres, municipalities and educational establishments.


Early Education Career Institute is a nonprofit that offers affordable US DOL Registered Apprenticeship opportunities for Early Childhood Educators. Each program is competence base offering On the job training, Dual CDA courses and College credits meeting the acceptable professional education criter

Gloucestershire College is a career-focused college of further and higher education, delivering award-winning apprenticeships, professional and technical training in Cheltenham, Gloucester and the Forest of Dean. We educate motivated and ambitious students to achieve their goals, whilst providing e

Crediamo che promuovere la cultura della sicurezza sia un super potere! Ci rivolgiamo principalmente alla comunità di professionisti che ogni giorno si misura con questa missione e con le sfide emergenti che l'applicazione delle norme in materia di sicurezza propongono quotidianamente. Condividia

Generamos valor a través de actividades de capacitación y el aprendizaje de habilidades y competencias laborales que impactan positivamente en el desempeño de los trabajadores, la productividad, la seguridad y el resultados de nuestros clientes. Somos un Centro de Formación y Organismo Técnico

Forklift Training Systems is a national provider of industry-leading, OSHA-compliant safety training for operators and trainers of material handling equipment, mobile elevating work platforms, and offers an extensive supply of safety products. Experienced class instructors provide a combination of h

AP-Learning Systems provides innovative training resources for future and existing maintenance and project planners, schedulers, project control analysts, and any other professional whose job requires understanding or executing planning functions. Our seasoned practitioners have designed a unique on
.png)
John McAfee's genius led him down some dark roads before his death. Here's the story of how he went from renowned security CEO to eccentric...
Writer Stephen Rodrick reflects on time spent with cybersecurity-innovator-turned-international-fugitive John McAfee who died yesterday.
Eccentric cybersecurity pioneer and long-time cryptocurrency bull John McAfee just hit a major technical hurdle in his gamble that the...
John McAfee Charged With Crypto Fraud and Tax Evasion: The eccentric cybersecurity pioneer could face up to five years.
Eccentric security software guru John McAfee, 71, and his 34-year-old wife have opened up about their first meeting, when he hired her as a prostitute.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Eccentrix is http://www.eccentrix.ca.
According to Rankiteo, Eccentrix’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, Eccentrix currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Eccentrix is not certified under SOC 2 Type 1.
According to Rankiteo, Eccentrix does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Eccentrix is not listed as GDPR compliant.
According to Rankiteo, Eccentrix does not currently maintain PCI DSS compliance.
According to Rankiteo, Eccentrix is not compliant with HIPAA regulations.
According to Rankiteo,Eccentrix is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Eccentrix operates primarily in the Technical and Vocational Training industry.
Eccentrix employs approximately 9 people worldwide.
Eccentrix presently has no subsidiaries across any sectors.
Eccentrix’s official LinkedIn profile has approximately 2,767 followers.
Eccentrix is classified under the NAICS code 6115, which corresponds to Technical and Trade Schools.
No, Eccentrix does not have a profile on Crunchbase.
Yes, Eccentrix maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/eccentrix.
As of December 22, 2025, Rankiteo reports that Eccentrix has not experienced any cybersecurity incidents.
Eccentrix has an estimated 121 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Eccentrix has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.