Company Details
fort-dearborn-company
859
9,915
323
fortdearborn.com
0
FOR_1873174
In-progress

Fort Dearborn Company Company CyberSecurity Posture
fortdearborn.comFort Dearborn Company is a leading supplier of high-impact decorative labels for the beverage, food, household products, nutraceutical, paint and coatings, personal care, private label/retail and spirits markets. We specialize in a variety of solutions to fit your packaging needs. Our customers benefit from seamless migration across various label types and print technologies to best match their requirements. We are committed to Customer Intimacy and providing customers with value, service and the highest quality attainable. We deliver solutions designed to meet customer's needs and exceed their expectations every single day. Headquartered in Elk Grove, Illinois, the company has 14 operating divisions in North America.
Company Details
fort-dearborn-company
859
9,915
323
fortdearborn.com
0
FOR_1873174
In-progress
Between 750 and 799

FDC Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving Multi-Color Corporation (MCC) on October 29, 2022. The breach, which occurred on September 15, 2022, involved unauthorized access to employee personnel files, compromising information including names, dates of birth, social security numbers, and healthcare data for an unspecified number of individuals.
Description: The California Office of the Attorney General reported that Multi-Color Corporation experienced a data breach resulting from a theft at a law firm, where a hard drive containing personal identifiable information (PII) of all current US employees, certain former employees, and applicants was stolen on May 14 or 15, 2016. The reported date of this incident was August 5, 2016, and the specifics regarding the number of affected individuals are unknown.
Description: Multi-Color Corporation (“MCC”) suffered a data breach after it identified that an unauthorized party gained access to files on its network containing the personal information of employees and their dependents. The breach leaked the data including names, dates of birth, email addresses, mailing addresses, telephone numbers, Social Security numbers, driver’s license numbers, healthcare and health insurance-related data, and certain tax and financial data. MCC soon secured its systems and began working with an outside “incident response” team to assist with its investigation and also sent out the breach notice to the impacted parties.


No incidents recorded for Fort Dearborn Company in 2025.
No incidents recorded for Fort Dearborn Company in 2025.
No incidents recorded for Fort Dearborn Company in 2025.
FDC cyber incidents detection timeline including parent company and subsidiaries

Fort Dearborn Company is a leading supplier of high-impact decorative labels for the beverage, food, household products, nutraceutical, paint and coatings, personal care, private label/retail and spirits markets. We specialize in a variety of solutions to fit your packaging needs. Our customers benefit from seamless migration across various label types and print technologies to best match their requirements. We are committed to Customer Intimacy and providing customers with value, service and the highest quality attainable. We deliver solutions designed to meet customer's needs and exceed their expectations every single day. Headquartered in Elk Grove, Illinois, the company has 14 operating divisions in North America.


Asia Pacific Offset specializes in the craft of bookmaking. For more than two decades, Asia Pacific Offset has produced books and printed media of the highest quality. We are artisans, transforming the visions of our clients into beautiful products. The books we print are keepsakes to be appreciate

Ennis, Inc., together with its subsidiaries, engages in the production and sale of business forms and other business products in North America. The Print segment designs, manufactures, and sells business forms and printed business products including snap sets, continuous forms, laser cut sheets,

Gateway Communication Inc. has a mission to provide small to mid-sized companies and non-profits with the kind of responsive in-house marketing capabilities that larger firms enjoy. Direct mail is a complex undertaking that requires extensive knowledge of postal codes and regulations, data managemen

Sault Printing Company was founded in 1969 by Theodore Maleport and has been the Sault’s leading press shop as well as it’s one stop for all office equipment needs. Since 1982 Sault Printing has also been the Sault’s only Ricoh dealer and service department. Sault Printing and its attentive staff

Knight Media Printing can provide your business with any print, design, website, mailing and promotional products to enhance your business to its fullest. We have been servicing the Southwest Louisiana and Southeast Texas area for many years with superior quality and customer service. For more info

Precision Ink Corporation was founded in 2009 with the vision of becoming the premier producer of printing inks and coatings supplying printing organizations across the country. Located 18 miles outside of Chicago in Elk Grove Village, Illinois, we are strategically positioned to efficiently servic
.png)
Private-equity firm Clayton Dubilier & Rice LLC has struck a deal to buy Fort Dearborn Co. and Multi-Color Corp. and merge the label manufacturers.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Fort Dearborn Company is http://www.fortdearborn.com.
According to Rankiteo, Fort Dearborn Company’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Fort Dearborn Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Fort Dearborn Company is not certified under SOC 2 Type 1.
According to Rankiteo, Fort Dearborn Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Fort Dearborn Company is not listed as GDPR compliant.
According to Rankiteo, Fort Dearborn Company does not currently maintain PCI DSS compliance.
According to Rankiteo, Fort Dearborn Company is not compliant with HIPAA regulations.
According to Rankiteo,Fort Dearborn Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Fort Dearborn Company operates primarily in the Printing Services industry.
Fort Dearborn Company employs approximately 859 people worldwide.
Fort Dearborn Company presently has no subsidiaries across any sectors.
Fort Dearborn Company’s official LinkedIn profile has approximately 9,915 followers.
Fort Dearborn Company is classified under the NAICS code 323, which corresponds to Printing and Related Support Activities.
No, Fort Dearborn Company does not have a profile on Crunchbase.
Yes, Fort Dearborn Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fort-dearborn-company.
As of December 17, 2025, Rankiteo reports that Fort Dearborn Company has experienced 3 cybersecurity incidents.
Fort Dearborn Company has an estimated 5,157 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with sent out breach notice to impacted parties..
Title: Multi-Color Corporation Data Breach
Description: Multi-Color Corporation (MCC) suffered a data breach after an unauthorized party gained access to files on its network containing the personal information of employees and their dependents.
Type: Data Breach
Title: Data Breach at Multi-Color Corporation
Description: The California Office of the Attorney General reported that Multi-Color Corporation experienced a data breach resulting from a theft at a law firm, where a hard drive containing personal identifiable information (PII) of all current US employees, certain former employees, and applicants was stolen on May 14 or 15, 2016.
Date Detected: 2016-08-05
Type: Data Breach
Attack Vector: Theft
Vulnerability Exploited: Physical Security
Title: Data Breach at Multi-Color Corporation
Description: The California Office of the Attorney General reported a data breach involving Multi-Color Corporation (MCC) on October 29, 2022. The breach, which occurred on September 15, 2022, involved unauthorized access to employee personnel files, compromising information including names, dates of birth, social security numbers, and healthcare data for an unspecified number of individuals.
Date Detected: 2022-09-15
Date Publicly Disclosed: 2022-10-29
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Dates of birth, Email addresses, Mailing addresses, Telephone numbers, Social security numbers, Driver’s license numbers, Healthcare and health insurance-related data, Certain tax and financial data

Data Compromised: Pii

Data Compromised: Names, Dates of birth, Social security numbers, Healthcare data
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Email Addresses, Mailing Addresses, Telephone Numbers, Social Security Numbers, Driver’S License Numbers, Healthcare And Health Insurance-Related Data, Certain Tax And Financial Data, , Pii, , Personally Identifiable Information, Healthcare Data and .

Entity Name: Multi-Color Corporation
Entity Type: Company
Industry: Printing and Packaging

Entity Name: Multi-Color Corporation
Entity Type: Company
Industry: Printing and Packaging
Location: United States

Entity Name: Multi-Color Corporation
Entity Type: Company
Industry: Manufacturing

Incident Response Plan Activated: True
Communication Strategy: Sent out breach notice to impacted parties

Type of Data Compromised: Names, Dates of birth, Email addresses, Mailing addresses, Telephone numbers, Social security numbers, Driver’s license numbers, Healthcare and health insurance-related data, Certain tax and financial data
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information, Healthcare data
Sensitivity of Data: High
Personally Identifiable Information: namesdates of birthsocial security numbers

Source: California Office of the Attorney General
Date Accessed: 2016-08-05

Source: California Office of the Attorney General
Date Accessed: 2022-10-29
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2016-08-05, and Source: California Office of the Attorney GeneralDate Accessed: 2022-10-29.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Sent out breach notice to impacted parties.
Most Recent Incident Detected: The most recent incident detected was on 2016-08-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-10-29.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of birth, Email addresses, Mailing addresses, Telephone numbers, Social Security numbers, Driver’s license numbers, Healthcare and health insurance-related data, Certain tax and financial data, , PII, , names, dates of birth, social security numbers, healthcare data and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Telephone numbers, Email addresses, Certain tax and financial data, Social Security numbers, Names, PII, Mailing addresses, Driver’s license numbers, names, Healthcare and health insurance-related data, healthcare data, Dates of birth, social security numbers and dates of birth.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.