Comparison Overview

EZ Living Furniture

VS

NO-NO

EZ Living Furniture

Galway, Ireland, undefined, undefined, IE
Last Update: 2025-11-26

Founded in 1998, EZ Living Furniture is a family run, Irish owned and operated retailer. We have 17 stores currently operating nationwide and plans for more. We have over 300 fantastic employees. EZ Living Furniture has become the number one selling furniture brand in Ireland and we are dedicated to providing our customers with an outstanding level of customer service, knowledge and assistance. We strive to be Ireland’s most customer focused company where people can find and discover amazing furniture and accessories for their home. There are several factors that have contributed to our success and these are centred around the 3P’s – People, Product and Presentation which all reflect the vision and personal style of EZ Living Furniture. We encourage and nurture the entrepreneurial spirit that is part of the unique culture of EZ Living Furniture. We offer the opportunity to develop new skills and to further yourself in a challenging and enjoyable work environment. We continue to invest heavily in our training programmes and, over the years, it has been this emphasis on staff development that has been an integral part of our sustained success. Wherever possible we look to promote from within and value the career prospects and development of all our current staff members. To find out what it’s like to work at EZ Living Furniture , visit our careers page https://www.ezlivingfurniture.ie/careers

NAICS: 337
NAICS Definition:
Employees: 157
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

NO-NO

None
Last Update: 2025-11-25
Between 750 and 799

NOUVELL- design for living: Empresa dedicada a proyectos de areas como cocinas, closets, walking closets, baños. Diseño de proyecto y oferta de mobiliario y acabados variados como pisos en piedra natural, porcelanatos, ceramicas, pisos laminados vinilicos y madera, electrodomesticos, countertops de piedras naturales, puertas de paso, etc. Representantes para Costa Rica de Wolf y Sub Zero. Servicio tecnico, instalacion, garantias y respaldos de marca y productos.

NAICS: 337
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ez-living-furniture.jpeg
EZ Living Furniture
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/nouvell-costa-rica.jpeg
NO-NO
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
EZ Living Furniture
100%
Compliance Rate
0/4 Standards Verified
NO-NO
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for EZ Living Furniture in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for NO-NO in 2025.

Incident History — EZ Living Furniture (X = Date, Y = Severity)

EZ Living Furniture cyber incidents detection timeline including parent company and subsidiaries

Incident History — NO-NO (X = Date, Y = Severity)

NO-NO cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ez-living-furniture.jpeg
EZ Living Furniture
Incidents

No Incident

https://images.rankiteo.com/companyimages/nouvell-costa-rica.jpeg
NO-NO
Incidents

No Incident

FAQ

NO-NO company demonstrates a stronger AI Cybersecurity Score compared to EZ Living Furniture company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, NO-NO company has disclosed a higher number of cyber incidents compared to EZ Living Furniture company.

In the current year, NO-NO company and EZ Living Furniture company have not reported any cyber incidents.

Neither NO-NO company nor EZ Living Furniture company has reported experiencing a ransomware attack publicly.

Neither NO-NO company nor EZ Living Furniture company has reported experiencing a data breach publicly.

Neither NO-NO company nor EZ Living Furniture company has reported experiencing targeted cyberattacks publicly.

Neither EZ Living Furniture company nor NO-NO company has reported experiencing or disclosing vulnerabilities publicly.

Neither EZ Living Furniture nor NO-NO holds any compliance certifications.

Neither company holds any compliance certifications.

Neither EZ Living Furniture company nor NO-NO company has publicly disclosed detailed information about the number of their subsidiaries.

EZ Living Furniture company employs more people globally than NO-NO company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither EZ Living Furniture nor NO-NO holds SOC 2 Type 1 certification.

Neither EZ Living Furniture nor NO-NO holds SOC 2 Type 2 certification.

Neither EZ Living Furniture nor NO-NO holds ISO 27001 certification.

Neither EZ Living Furniture nor NO-NO holds PCI DSS certification.

Neither EZ Living Furniture nor NO-NO holds HIPAA certification.

Neither EZ Living Furniture nor NO-NO holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.