ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

ISI Grand Rapids is a small, family-owned business that built a solid reputation on providing service and expertise. ISI has an dedicated and smart staff of engineers and support personnel who hold some of the most prestigious industry-standard degrees and certifications. ISI is also proud to say we are a Microsoft Silver Certified Partner, Microsoft Small Business Specialist, and Cisco Premier Certified Partner, and has teamed up with companies like HP, Microsoft, IBM, Cisco and more to provide our customers a full array of excellent products which support every layer of the ISI Stack.

ISI Grand Rapids (Information Systems Intelligence) A.I CyberSecurity Scoring

IGR

Company Details

Linkedin ID:

information-systems-intelligence

Employees number:

6

Number of followers:

61

NAICS:

None

Industry Type:

Computer Networking Products

Homepage:

isigr.com

IP Addresses:

0

Company ID:

ISI_1782386

Scan Status:

In-progress

AI scoreIGR Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/information-systems-intelligence.jpeg
IGR Computer Networking Products
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIGR Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/information-systems-intelligence.jpeg
IGR Computer Networking Products
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

IGR Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

IGR Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for IGR

Incidents vs Computer Networking Products Industry Average (This Year)

No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.

Incident Types IGR vs Computer Networking Products Industry Avg (This Year)

No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.

Incident History — IGR (X = Date, Y = Severity)

IGR cyber incidents detection timeline including parent company and subsidiaries

IGR Company Subsidiaries

SubsidiaryImage

ISI Grand Rapids is a small, family-owned business that built a solid reputation on providing service and expertise. ISI has an dedicated and smart staff of engineers and support personnel who hold some of the most prestigious industry-standard degrees and certifications. ISI is also proud to say we are a Microsoft Silver Certified Partner, Microsoft Small Business Specialist, and Cisco Premier Certified Partner, and has teamed up with companies like HP, Microsoft, IBM, Cisco and more to provide our customers a full array of excellent products which support every layer of the ISI Stack.

Loading...
similarCompanies

IGR Similar Companies

Lithic LLC

Lithic was formed with a new philosophy in the way an I.T. company services its clients. We call it Human I.T. We understand that tecchnology should work for people, not vice versa. If your company is ready for a more personal, human approach to I.T. solutions, then you’re ready for Lithic.

Systel Incorporated

More than just an IT firm, Systel is your full service provider of comprehensive and integrated technology services and solutions. Since 1996, Systel has been a full service technology solution provider to businesses. Offering end-to-end solutions for your company’s needs, we allow you to focus o

BE Networks

BE Networks is the alternative IT company that transforms the way customers procure their hardware. Our unique circular business model offers our customers the chance to benefit from our smart, affordable solutions with a minimum environmental footprint. Tailored Preowned solutions with no lead tim

Centerpoint Communications

Welcome to Centerpoint Communications Centerpoint specializes in the design and installation of Voice /Data and Audio/Visual systems. We serve all industries; private, public, and government sectors. Call today (714) C A B L I N G We have successfully completed projects, large and small,

Dapp.com

Dapp.com is a one-stop platform for all the dapps you will love: - Everyone can discover what decentralized technology is and how it can transform the world; - Developers can gain the tools and knowledge to bring their innovative decentralized tech ideas to market; - Dapps can be showcased to and

Applied Integration, Inc.

IT support services are vital for all businesses, but they are often overlooked by medium sized businesses who think they can't afford it. The truth is, IT support services can save you time and money in the long run. By outsourcing your IT needs, you can focus on running your business, rather than

newsone

IGR CyberSecurity News

November 21, 2024 08:00 AM
Ferris State Information Security and Intelligence students make strong showing in Big Ten Academic Alliance competition

Ferris State ISI students, taking part unaffiliated, took six of the top 15 places, with second-year student Janek Vedock finishing first overall.

January 29, 2023 08:00 AM
National Security Agency partners with Ferris State to boost university’s cybersecurity training

BIG RAPIDS, MI – To meet the growing national demand for skilled cybersecurity workers, Ferris State University is partnering with the...

December 28, 2018 08:00 AM
Judge Decides Against Michigan County in IT Fraud Lawsuit

After a two-year lawsuit, Muskegon County, Mich., must pay $230K to former contractor Ryan Leestma, who sued because the county shortchanged his company.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IGR CyberSecurity History Information

Official Website of ISI Grand Rapids (Information Systems Intelligence)

The official website of ISI Grand Rapids (Information Systems Intelligence) is http://www.isigr.com.

ISI Grand Rapids (Information Systems Intelligence)’s AI-Generated Cybersecurity Score

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence)’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.

How many security badges does ISI Grand Rapids (Information Systems Intelligence)’ have ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does ISI Grand Rapids (Information Systems Intelligence) have SOC 2 Type 1 certification ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not certified under SOC 2 Type 1.

Does ISI Grand Rapids (Information Systems Intelligence) have SOC 2 Type 2 certification ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) does not hold a SOC 2 Type 2 certification.

Does ISI Grand Rapids (Information Systems Intelligence) comply with GDPR ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not listed as GDPR compliant.

Does ISI Grand Rapids (Information Systems Intelligence) have PCI DSS certification ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) does not currently maintain PCI DSS compliance.

Does ISI Grand Rapids (Information Systems Intelligence) comply with HIPAA ?

According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not compliant with HIPAA regulations.

Does ISI Grand Rapids (Information Systems Intelligence) have ISO 27001 certification ?

According to Rankiteo,ISI Grand Rapids (Information Systems Intelligence) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of ISI Grand Rapids (Information Systems Intelligence)

ISI Grand Rapids (Information Systems Intelligence) operates primarily in the Computer Networking Products industry.

Number of Employees at ISI Grand Rapids (Information Systems Intelligence)

ISI Grand Rapids (Information Systems Intelligence) employs approximately 6 people worldwide.

Subsidiaries Owned by ISI Grand Rapids (Information Systems Intelligence)

ISI Grand Rapids (Information Systems Intelligence) presently has no subsidiaries across any sectors.

ISI Grand Rapids (Information Systems Intelligence)’s LinkedIn Followers

ISI Grand Rapids (Information Systems Intelligence)’s official LinkedIn profile has approximately 61 followers.

ISI Grand Rapids (Information Systems Intelligence)’s Presence on Crunchbase

No, ISI Grand Rapids (Information Systems Intelligence) does not have a profile on Crunchbase.

ISI Grand Rapids (Information Systems Intelligence)’s Presence on LinkedIn

Yes, ISI Grand Rapids (Information Systems Intelligence) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/information-systems-intelligence.

Cybersecurity Incidents Involving ISI Grand Rapids (Information Systems Intelligence)

As of November 28, 2025, Rankiteo reports that ISI Grand Rapids (Information Systems Intelligence) has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

ISI Grand Rapids (Information Systems Intelligence) has an estimated 949 peer or competitor companies worldwide.

ISI Grand Rapids (Information Systems Intelligence) CyberSecurity History Information

How many cyber incidents has ISI Grand Rapids (Information Systems Intelligence) faced ?

Total Incidents: According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at ISI Grand Rapids (Information Systems Intelligence) ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=information-systems-intelligence' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge