Company Details
erpi
111
2,343
511
erpi.com
0
ERP_1743008
In-progress

ERPI Company CyberSecurity Posture
erpi.comFondée en 1965, ERPI est une maison d'édition québécoise dans le milieu de l'éducation. Notre mission consiste à susciter la passion d’apprendre et de faire apprendre, grâce à la création et à la diffusion de solutions pédagogiques novatrices et diversifiées qui s’inscrivent dans une tradition d’excellence. #erpi ------ En tant que membre du groupe TC Transcontinental, nous adhérons à la Politique sur la vie privée de TC Transcontinental, qui régit la façon dont nous recueillons, utilisons, divulguons, traitons et protégeons les renseignements personnels dont nous avons la garde et le contrôle. Cliquez ici pour consulter la Politique sur la vie privée de TC Transcontinental: https://tctranscontinental.com/fr-ca/politique-sur-la-vie-privee
Company Details
erpi
111
2,343
511
erpi.com
0
ERP_1743008
In-progress
Between 750 and 799

ERPI Global Score (TPRM)XXXX



No incidents recorded for ERPI in 2025.
No incidents recorded for ERPI in 2025.
No incidents recorded for ERPI in 2025.
ERPI cyber incidents detection timeline including parent company and subsidiaries

Fondée en 1965, ERPI est une maison d'édition québécoise dans le milieu de l'éducation. Notre mission consiste à susciter la passion d’apprendre et de faire apprendre, grâce à la création et à la diffusion de solutions pédagogiques novatrices et diversifiées qui s’inscrivent dans une tradition d’excellence. #erpi ------ En tant que membre du groupe TC Transcontinental, nous adhérons à la Politique sur la vie privée de TC Transcontinental, qui régit la façon dont nous recueillons, utilisons, divulguons, traitons et protégeons les renseignements personnels dont nous avons la garde et le contrôle. Cliquez ici pour consulter la Politique sur la vie privée de TC Transcontinental: https://tctranscontinental.com/fr-ca/politique-sur-la-vie-privee


Fisher Heaton Games is an independent developer and publisher of board games located in Charlotte, NC. We are focused on creating immersive tabletop game environments that encourage live social interactions between players. We enjoy playing board games, card games, and miniature war games and we hav

Rose Calendars are proud to offer over a century of experience in designing, publishing and printing calendars. Proven to be one of the most cost-effective forms of advertising and providing a medium for your business promotion, calendars ensure your brand is in front of your customers, increasing y

We are William Reed, the trusted digital, high value data and events business serving the food and drinks sector for over 160 years. Since 1862, we've been committed to creating impactful connections that inspire and empower our clients, harnessing the latest technology along the way. Today, we're

Foundry, formerly IDG Australia Pty Ltd is a wholly owned subsidiary of IDG Inc, Foundry has played a key role in every major milestone, announcement, and development in modern technology since 1964. Today, Foundry continues to lead the world by helping companies bring their visions to reality throu

1883 Magazine celebrates all that is new and exciting in the world of fashion, music, film + the arts. Born in West London in 2010, 1883 is an independently produced lifestyle biannual and online platform that showcases and promotes the most innovative new talent around. What began as a small fas

Caribe Media, Inc. is the holding company that owns Axesa Servicios de Información, S. en C., Caribe Media, S. A. and Axesa Digital Network, Inc. For over 80 and 50 years respectively, Axesa Servicios de Información, S. en C. and Caribe Media, S. A. have been the official publishers of Caribe Med
.png)
George Wilson, ECS ASGN Inc. acquired health care consulting and data analytics firm Enterprise Resource Performance, Inc.,...
The acquisition of ERPi deepens ECS' capabilities across a number of exciting solution areas and provides key contract vehicles that will bolster our current...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ERPI is https://www.erpi.com/fr/.
According to Rankiteo, ERPI’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, ERPI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ERPI is not certified under SOC 2 Type 1.
According to Rankiteo, ERPI does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ERPI is not listed as GDPR compliant.
According to Rankiteo, ERPI does not currently maintain PCI DSS compliance.
According to Rankiteo, ERPI is not compliant with HIPAA regulations.
According to Rankiteo,ERPI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ERPI operates primarily in the Book and Periodical Publishing industry.
ERPI employs approximately 111 people worldwide.
ERPI presently has no subsidiaries across any sectors.
ERPI’s official LinkedIn profile has approximately 2,343 followers.
ERPI is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, ERPI does not have a profile on Crunchbase.
Yes, ERPI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/erpi.
As of November 28, 2025, Rankiteo reports that ERPI has not experienced any cybersecurity incidents.
ERPI has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ERPI has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.