Company Details
igo
62
358
323
imprimerie-igo.net
0
IGO_2793335
In-progress

IGO Company CyberSecurity Posture
imprimerie-igo.netDe la création graphique à la livraison, une maîtrise totale de la chaîne de production. Située en Vendée depuis plus de 40 ans, l’équipe de l’Imprimerie Graphique de l’Ouest, vous accompagne et vous conseille sur vos différents supports d’impression. Quelle que soit la quantité ou la méthode, en impression offset ou numérique, son savoir-faire vous assure un projet sur-mesure dans le respect de la qualité et des délais. Soucieux de l’environnement, les papiers et procédés suivent une démarche de fabrication éco-responsable.
Company Details
igo
62
358
323
imprimerie-igo.net
0
IGO_2793335
In-progress
Between 750 and 799

IGO Global Score (TPRM)XXXX



No incidents recorded for IGO in 2025.
No incidents recorded for IGO in 2025.
No incidents recorded for IGO in 2025.
IGO cyber incidents detection timeline including parent company and subsidiaries

De la création graphique à la livraison, une maîtrise totale de la chaîne de production. Située en Vendée depuis plus de 40 ans, l’équipe de l’Imprimerie Graphique de l’Ouest, vous accompagne et vous conseille sur vos différents supports d’impression. Quelle que soit la quantité ou la méthode, en impression offset ou numérique, son savoir-faire vous assure un projet sur-mesure dans le respect de la qualité et des délais. Soucieux de l’environnement, les papiers et procédés suivent une démarche de fabrication éco-responsable.


We are a powerhouse in Digital, Lithography and Screen Printing. In both divisions, we print on conventional papers, as well as plastic, vinyl and non-standard substrates. We can print offset pieces up to 59" x 80", screen print materials in excess of 18 feet long and digitally 63" x 126" — large

Established in 1983, imageData Group leads the way in innovative, data-driven print, imaging and visual communications; providing visual communication solutions for our clients in the retail, corporate, trade and public sectors. Continuous innovation and investment in plant and equipment are at the

A Tecmach é uma empresa especializada em Outsourcing de Impressão e soluções, com mais de 25 anos de mercado e abrangência nacional. Atualmente conta com cerca de 150 colaboradores e administra em torno de 40 milhões de páginas por mês. Mantém parceria com grandes fabricantes do mercado como LEXMARK

A high-quality commercial printer with an extensive equipment list that includes a Goss Sunday 2000 web press and two Heidelberg eight-color SM 102 Speedmasters with perfectors and CutStar roll sheeters. The Panama City, Florida commercial printer serves the southeast United States with a complete d

Lightning Press is a well respected Digital Book Printing company specializing in short run book printing services for quantities of 25-2000 including all Hardcover and Softcover Books. Layout styles for portrait or landscape books are available for perfect binding, case binding, paperbacks, soft

At QLM Label Makers we bring LABELS ALIVE with Premium Quality Labels, Beautiful Packaging and the Best Value Label Printers. When you are ready to bring your BRAND ALIVE speak with QLM. We start by asking "What do you want to achieve?" - so we can get a better understanding of your business and
.png)
On 27 November, Charlotte Conings will moderate the session “Balancing Privacy and Law Enforcement in the Digital Age” at the 25 Years of...
How do we eliminate the deepfake threat? Short answer: get rid of Generative AI.
At UNHCR, the United Nations High Commissioner for Refugees, we are aware of various fraudulent schemes being circulated via email, social media and...
Virginia Wesleyan University Global Campus IT boot camps will prepare you for in-demand, high-paying jobs in the tech sector. Gain the skills and practical...
Former federal prosecutor and Jones Day partner Jay Johnson moved in-house to Charles Schwab in September to help build and lead the financial services giant's...
SIT is stepping up to the plate to train future cyber professionals. A key part of its curriculum is to teach real world cyber skills - by getting students to...
Austin data privacy and cybersecurity lawyer Cheryl Burtzel is launching Spencer Fane's fourth Texas office, the firm announced on Thursday.
Volkswagen announced today that it will found a new automotive cyber security venture, based on Israeli knowledge and technology.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IGO is https://www.imprimerie-igo.net.
According to Rankiteo, IGO’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, IGO currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IGO is not certified under SOC 2 Type 1.
According to Rankiteo, IGO does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IGO is not listed as GDPR compliant.
According to Rankiteo, IGO does not currently maintain PCI DSS compliance.
According to Rankiteo, IGO is not compliant with HIPAA regulations.
According to Rankiteo,IGO is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IGO operates primarily in the Printing Services industry.
IGO employs approximately 62 people worldwide.
IGO presently has no subsidiaries across any sectors.
IGO’s official LinkedIn profile has approximately 358 followers.
IGO is classified under the NAICS code 323, which corresponds to Printing and Related Support Activities.
No, IGO does not have a profile on Crunchbase.
Yes, IGO maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/igo.
As of December 17, 2025, Rankiteo reports that IGO has not experienced any cybersecurity incidents.
IGO has an estimated 5,157 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, IGO has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.