
Harry Rosen Company Cyber Security Posture
harryrosen.comAs the leading luxury menswear retailer in Canada, you can count on Harry Rosen to keep you looking and feeling sharp. In business for over 65 years, we are proud to be recognized as one of the 100 Best Managed Companies in Canada. Our team is driven to inspire and grow, readily embracing change and technology. With a flexible growth model, we are dedicated to supporting our clientsโ needsโwhether it be in store, online, or through various curation services. Harry Rosenโs professional work environment is designed to support and invest in the success of our associates, as many become the creative leaders of tomorrow. We focus on building long-term relationships with our staff, our customers, and our partners. The reason why our associates choose to build long-term careers with our company? Simply put, because we care. It's in our DNA to recognize, promote, and reward exceptional work ethic and talent. Please visit our career site to learn more.
Harry Rosen Company Details
harry-rosen
796 employees
18732
452
Retail
harryrosen.com
Scan still pending
HAR_2858492
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Harry Rosen Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Harry Rosen Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Harry Rosen | Ransomware | 100 | 5 | 11/2022 | HAR03621222 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: Canadian menswear retailer Harry Rosen was hit by a cyber-attack after the BianLian group listed the company as a victim on the gangโs site. The site listed โFile server data. Projects, Marketing, HR, Public Relations,โ which suggests these are files that have been copied from the company network. The hackers also claimed that they have a list of Harry Rosenโs Gold+ clients, sales information, and various other types of documents. |
Harry Rosen Company Subsidiaries

As the leading luxury menswear retailer in Canada, you can count on Harry Rosen to keep you looking and feeling sharp. In business for over 65 years, we are proud to be recognized as one of the 100 Best Managed Companies in Canada. Our team is driven to inspire and grow, readily embracing change and technology. With a flexible growth model, we are dedicated to supporting our clientsโ needsโwhether it be in store, online, or through various curation services. Harry Rosenโs professional work environment is designed to support and invest in the success of our associates, as many become the creative leaders of tomorrow. We focus on building long-term relationships with our staff, our customers, and our partners. The reason why our associates choose to build long-term careers with our company? Simply put, because we care. It's in our DNA to recognize, promote, and reward exceptional work ethic and talent. Please visit our career site to learn more.
Access Data Using Our API

Get company history
.png)
Harry Rosen Cyber Security News
Robert Herjavec says 1 part-time job helped turn him into a billionaire โ he learned how to spot wealthy men and โsell to them.โ Hereโs the business legend that taught him โeverythingโ
The art of selling. Like Herjavec, learning to spot high-value customers โ or a receptive audience for your pitch โ could be your key to careerย ...
Cybersecurity Essentials for Leaders, a new Executive Education offering
Learn more about the latest Kellogg program as well as faculty lead Professor Mike Rogers & how he is turning his passion for cybersecurityย ...
Harry Rosen launching $50-million overhaul of its retail stores over five years
The men's wear retailer is adapting its network of stores to adjust to changing styles and shopping habits in the post-pandemic era.
How Harry Rosen turned to TELUS for a tailored network
Harry Rosen's EVP and Chief Information Officer Stephen Jackson discussed how the company was able to navigate the pandemic disruption by focusing theirย ...

Harry Rosen Similar Companies

Tesco
One of the worldโs largest retailers of consumer goods from food to fashion. Serving our customers, communities and planet a little better every day in our stores and online is at the heart of everything we do. Founded in 1919 by Jack Cohen using the ยฃ30 he received on leaving the Royal Flying Corp

Electrolux Home
Electrolux Home grundades 1995 som ett Franchisekoncept, idag bestโโขr kedjan av 25 butiker โโver hela Sverige samt e-handel. Electrolux Home โยงr butikskedjan fโโr hela kโโket och erbjuder kompletta kโโks- och fโโrvaringsinredningar, vitvaror och ett brett sortiment av utvalda cookshop och smโโขelspro

Aditya Birla Retail Limited
More Retail Limited ventured into food and grocery retail in 2007 through the acquisition of Trinethra Super Retail and subsequently expanded its presence nationally under the brand "moreโ across Supermarkets & Hypermarkets. There are currently 494 Supermarkets and 20 Hypermarkets which aims to offe

Azadea Group
AZADEA Group is a premier lifestyle retail company that owns and operates more than 40+ leading international franchise concepts across the Middle East and Africa. With over 13,500 employees, dedicated offices in every market it operates, and world-class infrastructure, the company oversees over 700

Kohl's
Kohlโs is a leading omnichannel retailer with more than 1,100 stores in 49 states. Kohl's business is built on a solid foundation of more than 60 million customers, an unmatched brand portfolio, industry-leading loyalty and Kohl's Card programs, a convenient and accessible nationwide store footprin

Leroy Merlin
Leroy Merlin is a major player in the global DIY market. We help people around the world with all their home improvement projects, from renovations and extensions, to decoration and repairs... We offer a wide range of DIY solutions that cover plumbing, lighting, heating, electricity, sanitation, se

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Harry Rosen CyberSecurity History Information
How many cyber incidents has Harry Rosen faced?
Total Incidents: According to Rankiteo, Harry Rosen has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Harry Rosen?
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Cyber Attack on Harry Rosen by BianLian Group
Description: Canadian menswear retailer Harry Rosen was hit by a cyber-attack after the BianLian group listed the company as a victim on the gangโs site. The site listed 'File server data. Projects, Marketing, HR, Public Relations,' which suggests these are files that have been copied from the company network. The hackers also claimed that they have a list of Harry Rosenโs Gold+ clients, sales information, and various other types of documents.
Type: Data Breach
Threat Actor: BianLian Group
Motivation: Data Theft
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach HAR03621222
Data Compromised: File server data, Projects, Marketing, HR, Public Relations, Gold+ clients list, Sales information, Various other types of documents
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are File server data, Projects, Marketing, HR, Public Relations, Gold+ clients list, Sales information and Various other types of documents.
Which entities were affected by each incident?
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach HAR03621222
Type of Data Compromised: File server data, Projects, Marketing, HR, Public Relations, Gold+ clients list, Sales information, Various other types of documents
Data Exfiltration: True
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an BianLian Group.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were File server data, Projects, Marketing, HR, Public Relations, Gold+ clients list, Sales information and Various other types of documents.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were File server data, Projects, Marketing, HR, Public Relations, Gold+ clients list, Sales information and Various other types of documents.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
