ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We are a British furniture and fabric company, renowned for being the most experienced makers of exceptional upholstered furniture. We believe in quality and service without compromise, combining precision, craftship and high-quality materials to create beautiful, enduring, comfortable furniture. All the furniture is made at our factory in Newcastle by the largest team of master upholsterers in the UK, using only the best responsibly sourced materials. Our flagship showroom is based on the iconic Kings Road in London (587-589 Kings Road, London, SW6 2EH). We also have showrooms in New York and Los Angeles and we are available through numerous distributors globally.

George Smith A.I CyberSecurity Scoring

George Smith

Company Details

Linkedin ID:

george-smith

Employees number:

92

Number of followers:

2,437

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

georgesmith.com

IP Addresses:

0

Company ID:

GEO_1216748

Scan Status:

In-progress

AI scoreGeorge Smith Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/george-smith.jpeg
George Smith Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGeorge Smith Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/george-smith.jpeg
George Smith Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

George Smith Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

George Smith Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for George Smith

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for George Smith in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for George Smith in 2025.

Incident Types George Smith vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for George Smith in 2025.

Incident History — George Smith (X = Date, Y = Severity)

George Smith cyber incidents detection timeline including parent company and subsidiaries

George Smith Company Subsidiaries

SubsidiaryImage

We are a British furniture and fabric company, renowned for being the most experienced makers of exceptional upholstered furniture. We believe in quality and service without compromise, combining precision, craftship and high-quality materials to create beautiful, enduring, comfortable furniture. All the furniture is made at our factory in Newcastle by the largest team of master upholsterers in the UK, using only the best responsibly sourced materials. Our flagship showroom is based on the iconic Kings Road in London (587-589 Kings Road, London, SW6 2EH). We also have showrooms in New York and Los Angeles and we are available through numerous distributors globally.

Loading...
similarCompanies

George Smith Similar Companies

Iceberg Enterprises

Since 1999, Iceberg Enterprises has been a leader in blow mold manufacturing in North America, including our own Iceberg proprietary brand of blow molded furniture. Our 150,000 sq ft. manufacturing facility includes state of the art machines capable of high-volume resin (HDPE) products production. I

Nevers Industries Inc

Over our 40-year history, Nevers has established an impressive legacy of beautifully crafted commercial furniture for some of the country’s most prestigious offices. From the Pentagon and Camp David to America’s Fortune 100 and 500 companies, our fit-for-performance solutions fuel workplace producti

The Telcar Group

Telcar is best described as a well established, financially sound group of wholly owned and aligned companies with a specific objective in mind; provide well managed, seamless and a controlled portfolio of professional and competitive contract furnishings and support services. Delivering quality pro

The Peak Antler Company

Antler artist Jeff Musgrave has been creating Antler Chandeliers and Antler Furniture for over 27 years. Jeff is well-known for his collaborations with Interior Designers, Architects and homeowners. Jeff’s Peak Antler Company creations can be found in high end residential and hospitality locations

EJ Victor

EJ Victor, recognized industry-wide for its exquisite quality, service, and value, is a locally owned, high-end furniture company located in North Carolina’s famous furniture heartland. Priding itself on the craftsmanship of devoted employees with know-how and commitment to building superior furnitu

Scholar Craft

Devoted to excellence and committed to quality, Scholar Craft has continuously designed and manufactured ergonomic, durable and practical school furniture since 1956. In a manufacturing world where the term “Made in America” has been used loosely or lost in semantics, Scholar Craft proudly produces

newsone

George Smith CyberSecurity News

November 07, 2025 05:00 AM
Bradford newlyweds prepare for strongman competition season after tying the knot

George Smith and Kathryn Bradney, who met at the University of Bradford, are set to compete in this year's England's Strongest Man...

October 23, 2025 07:00 AM
MARINE CORPS SCHOLARSHIP FOUNDATION ANNOUNCES LIEUTENANT GENERAL GEORGE W. SMITH JR., USMC (RET.), AS NEW CHAIRMAN OF THE BOARD

The Marine Corps Scholarship Foundation (MCSF), a national nonprofit providing postsecondary educational scholarships to the children of...

September 10, 2025 07:00 AM
'Cybercrime isn't slowing down': Utah Tech University to host free cybersecurity seminar

To help community members avoid digital scams and protect their money from cybercriminals, Utah Tech University's Community Education...

May 02, 2025 07:00 AM
UK retailers under attack: why hackers hit household names

M&S, the Co-op and Harrods have all been targeted by cyber criminals in recent days.

April 03, 2025 07:00 AM
Who is the richest person in Utah? This familiar names sit on Forbes billionaire list

Forbes compiled its annual list of billionaires. This year's version has more names and more money than ever before.

March 19, 2025 07:00 AM
Hunted Labs lands $3M to find suspicious open source contributors

Former NSA deputy director George Barnes has made his first investment as a venture capitalist for his new job at the VC incubation studio...

December 15, 2024 01:52 AM
College Advisory Councils

The GW College of Professional Studies Dean's Advisory Council is composed of a dynamic and diverse group of industry leaders who bring unparalleled expertise.

November 18, 2024 08:00 AM
Cybersecurity Expert Hacks Postal Service Scammers Who Tricked His Wife (Exclusive)

Cybersecurity expert Grant Smith wasn't about to let it slide when scammers tried bilking his wife through a phony USPS text, also known as...

October 01, 2024 07:00 AM
10 Entrepreneurs That Revolutionised The Cybersecurity Industry

Cybersecurity is quickly becoming one of the most important parts of modern businesses, especially as cyberattacks can cause high financial...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

George Smith CyberSecurity History Information

Official Website of George Smith

The official website of George Smith is http://www.georgesmith.com.

George Smith’s AI-Generated Cybersecurity Score

According to Rankiteo, George Smith’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does George Smith’ have ?

According to Rankiteo, George Smith currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does George Smith have SOC 2 Type 1 certification ?

According to Rankiteo, George Smith is not certified under SOC 2 Type 1.

Does George Smith have SOC 2 Type 2 certification ?

According to Rankiteo, George Smith does not hold a SOC 2 Type 2 certification.

Does George Smith comply with GDPR ?

According to Rankiteo, George Smith is not listed as GDPR compliant.

Does George Smith have PCI DSS certification ?

According to Rankiteo, George Smith does not currently maintain PCI DSS compliance.

Does George Smith comply with HIPAA ?

According to Rankiteo, George Smith is not compliant with HIPAA regulations.

Does George Smith have ISO 27001 certification ?

According to Rankiteo,George Smith is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of George Smith

George Smith operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at George Smith

George Smith employs approximately 92 people worldwide.

Subsidiaries Owned by George Smith

George Smith presently has no subsidiaries across any sectors.

George Smith’s LinkedIn Followers

George Smith’s official LinkedIn profile has approximately 2,437 followers.

NAICS Classification of George Smith

George Smith is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.

George Smith’s Presence on Crunchbase

No, George Smith does not have a profile on Crunchbase.

George Smith’s Presence on LinkedIn

Yes, George Smith maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/george-smith.

Cybersecurity Incidents Involving George Smith

As of November 28, 2025, Rankiteo reports that George Smith has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

George Smith has an estimated 2,617 peer or competitor companies worldwide.

George Smith CyberSecurity History Information

How many cyber incidents has George Smith faced ?

Total Incidents: According to Rankiteo, George Smith has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at George Smith ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=george-smith' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge