Company Details
highresolutions
35
340
323
highresolutions.com
0
HIG_2234386
In-progress

High Resolutions, Inc. Company CyberSecurity Posture
highresolutions.comFamily owned and operated in Knoxville, Tennessee since 1994, our services are unparalleled in craftsmanship and cutting-edge technology. But we want you to know, we’re really just hardworking, down-to-earth folks who care about helping our customers succeed. In fact, building relationships based on mutual respect, appreciation, and extraordinary collaboration is our ultimate goal. Our core values are steeped in commitment, excellence, and a true dedication to the community and customers we serve both locally and nationwide. Homegrown and still growing, we pride ourselves on providing a flourishing family atmosphere that bleeds over into our customer relationships. Our aim is to impact your life for the better by offering unsurpassed products and services that will help catapult your business to new heights. In fact, we’re here for the long haul and want to help you succeed for many years to come.
Company Details
highresolutions
35
340
323
highresolutions.com
0
HIG_2234386
In-progress
Between 750 and 799

HRI Global Score (TPRM)XXXX



No incidents recorded for High Resolutions, Inc. in 2025.
No incidents recorded for High Resolutions, Inc. in 2025.
No incidents recorded for High Resolutions, Inc. in 2025.
HRI cyber incidents detection timeline including parent company and subsidiaries

Family owned and operated in Knoxville, Tennessee since 1994, our services are unparalleled in craftsmanship and cutting-edge technology. But we want you to know, we’re really just hardworking, down-to-earth folks who care about helping our customers succeed. In fact, building relationships based on mutual respect, appreciation, and extraordinary collaboration is our ultimate goal. Our core values are steeped in commitment, excellence, and a true dedication to the community and customers we serve both locally and nationwide. Homegrown and still growing, we pride ourselves on providing a flourishing family atmosphere that bleeds over into our customer relationships. Our aim is to impact your life for the better by offering unsurpassed products and services that will help catapult your business to new heights. In fact, we’re here for the long haul and want to help you succeed for many years to come.


TampaPrinter.com is located 1723 W Kennedy Blvd. (Across from Ducky's Bar), Hours 9am-6pm Monday-Friday. Orders can be placed online, in store or over the phone at 813-PRINTER (774-6837). Tampa Printer specializes in tight deadline printing offering Next Day & Same Day turnaround on Graphic Design

With over 20 years in the printing and graphics industry, if it can be printed, we can do it for you. Magazines, catalogues, newsletters, direct mail, brochures, post cards, flyers, presentation materials, posters, signs, banners, and more... Sheet-fed, web offset, small & large format digital, gra

Dataflow has been managing information for design professionals since 1958. Our clients, from New York State government, to Fortune 500 firms and home-based businesses, look to Dataflow for advanced construction document management services - and they get them. We stay ahead of the latest in innova

Universal Printing Company LLC is located in Dunmore, Pennsylvania. It is a privately held, full-service printing and fulfillment company. Universal Printing Company serves clients in a broad range of industries, but specializes in the healthcare and financial markets, which require the production o

Founded in 1981, Print-Rite is one of the leading printing consumables providers, headquartered in Hong Kong, with subsidiaries in the US, UK, Macau and mainland China. We provide innovative printing solutions and offer over 10,000 models for inkjet, laser and ribbon printers, and copiers. Print-Ri

MEDIUS stands as an experienced leader in print industry and bring our customers' products to market efficiently. Since our inception over 40 years ago, MEDIUS has evolved from a print shop to become a well known provider of commercial printing services. We serve major companies globally and star
.png)
LONDON and AUSTIN, Texas, Dec. 10, 2025 — ORCA Computing, a leading quantum computing company, today announced a collaboration with ST...
Cybersecurity spending has soared in recent years. Organizations have faced new security challenges as cloud computing and remote work have...
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Top Cyber Security Projects: 1. Cybersecurity Incident Response Simulation Tool 2. Biometric Authentication System 3.
Cybersecurity has become essential to every company's sustainability, security, and growth strategy in today's digital world.
Cybersecurity is touted as having a zero unemployment rate. It is one of the fastest-growing and in-demand professions in the world today as...
Researchers at Sandia National Laboratories have developed brain-inspired AI algorithms that detect physical problems, cyberattacks and both...
If you're considering Aura's identity theft protection service, our guide explains all you need to know to see if Aura is right for you.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of High Resolutions, Inc. is http://www.highresolutions.com.
According to Rankiteo, High Resolutions, Inc.’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, High Resolutions, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, High Resolutions, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, High Resolutions, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, High Resolutions, Inc. is not listed as GDPR compliant.
According to Rankiteo, High Resolutions, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, High Resolutions, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,High Resolutions, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
High Resolutions, Inc. operates primarily in the Printing Services industry.
High Resolutions, Inc. employs approximately 35 people worldwide.
High Resolutions, Inc. presently has no subsidiaries across any sectors.
High Resolutions, Inc.’s official LinkedIn profile has approximately 340 followers.
No, High Resolutions, Inc. does not have a profile on Crunchbase.
Yes, High Resolutions, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/highresolutions.
As of December 17, 2025, Rankiteo reports that High Resolutions, Inc. has not experienced any cybersecurity incidents.
High Resolutions, Inc. has an estimated 5,157 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, High Resolutions, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.