Comparison Overview

Incodia International Ltd

VS

Emirates Printing Press, DUBAI (EPP)

Incodia International Ltd

2 Seddon Place, Skelmersdale, England, WN8 8EB, GB
Last Update: 2025-12-12
Between 750 and 799

We are the UK’s largest supplier of gift, loyalty and membership cards – and an innovative provider of FMCG packaging. For over 40 years, we have been supplying leading brands, retailers and membership organisations with cards and carriers – including our ground-breaking range of sustainable Earth Cards. To help our customers respond to changing shopping habits, we create innovative and sustainable solutions for them. Each year, we’re also trusted by big names to fulfil and personalise millions of items to send to our UK customers – from loyalty cards and membership packs, to promotional goods and online orders. For more information visit: www.incodia.co.uk or contact +44(0) 1206 845555

NAICS: 323
NAICS Definition:
Employees: 59
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Emirates Printing Press, DUBAI (EPP)

24-B Street, Dubai, undefined, 5106, AE
Last Update: 2025-12-12
Between 750 and 799

Based and operating in Dubai since 1974, Emirates Printing Press (EPP) is the leading printer of the region and has been honored with numerous awards for excellence and innovation in printing both regionally and internationally, including the USA. EPP has 5 plants covering more than 750 000 Sq.ft and 800+ strong workforce, making us the largest printing company in UAE equipped with the latest technology in pre-press, press and post-press. With the state-of-the-art facilities and huge production capacity in Sheet & Web Offset, Sheet & Rotary Gravure, Flexographic presses available and every process taking place in-house, we assure our clients of our best services with a short turnaround time. We specialize in printing and producing high quality Flexible Laminates & Pouches, Self-adhesive & Wrap-around Labels, Folding Cartons & Rigid Set-up Boxes for Perfumes, Cosmetics, Confectionaries, FMCG, Pharmaceuticals and Tobacco customers around the world. EPP's unparalleled programs ensure clients of high-quality products. Our international standards of business excellence and human resources are certified by its accreditations like ISO 9001, 14001, 45001, 22000, ISO/IEC 27001, ISO 14298, BRC, HACCP and member of SEDEX, PSO, FSC, PEFC certifications. Please visit our website www.eppdubai.com to know more about our services.

NAICS: 323
NAICS Definition:
Employees: 581
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/incodia-international.jpeg
Incodia International Ltd
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/emirates-printing-press-epp-.jpeg
Emirates Printing Press, DUBAI (EPP)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Incodia International Ltd
100%
Compliance Rate
0/4 Standards Verified
Emirates Printing Press, DUBAI (EPP)
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Incodia International Ltd in 2025.

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Emirates Printing Press, DUBAI (EPP) in 2025.

Incident History — Incodia International Ltd (X = Date, Y = Severity)

Incodia International Ltd cyber incidents detection timeline including parent company and subsidiaries

Incident History — Emirates Printing Press, DUBAI (EPP) (X = Date, Y = Severity)

Emirates Printing Press, DUBAI (EPP) cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/incodia-international.jpeg
Incodia International Ltd
Incidents

No Incident

https://images.rankiteo.com/companyimages/emirates-printing-press-epp-.jpeg
Emirates Printing Press, DUBAI (EPP)
Incidents

No Incident

FAQ

Emirates Printing Press, DUBAI (EPP) company demonstrates a stronger AI Cybersecurity Score compared to Incodia International Ltd company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Emirates Printing Press, DUBAI (EPP) company has disclosed a higher number of cyber incidents compared to Incodia International Ltd company.

In the current year, Emirates Printing Press, DUBAI (EPP) company and Incodia International Ltd company have not reported any cyber incidents.

Neither Emirates Printing Press, DUBAI (EPP) company nor Incodia International Ltd company has reported experiencing a ransomware attack publicly.

Neither Emirates Printing Press, DUBAI (EPP) company nor Incodia International Ltd company has reported experiencing a data breach publicly.

Neither Emirates Printing Press, DUBAI (EPP) company nor Incodia International Ltd company has reported experiencing targeted cyberattacks publicly.

Neither Incodia International Ltd company nor Emirates Printing Press, DUBAI (EPP) company has reported experiencing or disclosing vulnerabilities publicly.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Incodia International Ltd company nor Emirates Printing Press, DUBAI (EPP) company has publicly disclosed detailed information about the number of their subsidiaries.

Emirates Printing Press, DUBAI (EPP) company employs more people globally than Incodia International Ltd company, reflecting its scale as a Printing Services.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds SOC 2 Type 1 certification.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds SOC 2 Type 2 certification.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds ISO 27001 certification.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds PCI DSS certification.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds HIPAA certification.

Neither Incodia International Ltd nor Emirates Printing Press, DUBAI (EPP) holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L