Company Details
information-systems-intelligence
6
61
None
isigr.com
0
ISI_1782386
In-progress

ISI Grand Rapids (Information Systems Intelligence) Company CyberSecurity Posture
isigr.comISI Grand Rapids is a small, family-owned business that built a solid reputation on providing service and expertise. ISI has an dedicated and smart staff of engineers and support personnel who hold some of the most prestigious industry-standard degrees and certifications. ISI is also proud to say we are a Microsoft Silver Certified Partner, Microsoft Small Business Specialist, and Cisco Premier Certified Partner, and has teamed up with companies like HP, Microsoft, IBM, Cisco and more to provide our customers a full array of excellent products which support every layer of the ISI Stack.
Company Details
information-systems-intelligence
6
61
None
isigr.com
0
ISI_1782386
In-progress
Between 750 and 799

IGR Global Score (TPRM)XXXX



No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.
No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.
No incidents recorded for ISI Grand Rapids (Information Systems Intelligence) in 2025.
IGR cyber incidents detection timeline including parent company and subsidiaries

ISI Grand Rapids is a small, family-owned business that built a solid reputation on providing service and expertise. ISI has an dedicated and smart staff of engineers and support personnel who hold some of the most prestigious industry-standard degrees and certifications. ISI is also proud to say we are a Microsoft Silver Certified Partner, Microsoft Small Business Specialist, and Cisco Premier Certified Partner, and has teamed up with companies like HP, Microsoft, IBM, Cisco and more to provide our customers a full array of excellent products which support every layer of the ISI Stack.


Lithic was formed with a new philosophy in the way an I.T. company services its clients. We call it Human I.T. We understand that tecchnology should work for people, not vice versa. If your company is ready for a more personal, human approach to I.T. solutions, then you’re ready for Lithic.

More than just an IT firm, Systel is your full service provider of comprehensive and integrated technology services and solutions. Since 1996, Systel has been a full service technology solution provider to businesses. Offering end-to-end solutions for your company’s needs, we allow you to focus o

BE Networks is the alternative IT company that transforms the way customers procure their hardware. Our unique circular business model offers our customers the chance to benefit from our smart, affordable solutions with a minimum environmental footprint. Tailored Preowned solutions with no lead tim

Welcome to Centerpoint Communications Centerpoint specializes in the design and installation of Voice /Data and Audio/Visual systems. We serve all industries; private, public, and government sectors. Call today (714) C A B L I N G We have successfully completed projects, large and small,
Dapp.com is a one-stop platform for all the dapps you will love: - Everyone can discover what decentralized technology is and how it can transform the world; - Developers can gain the tools and knowledge to bring their innovative decentralized tech ideas to market; - Dapps can be showcased to and

IT support services are vital for all businesses, but they are often overlooked by medium sized businesses who think they can't afford it. The truth is, IT support services can save you time and money in the long run. By outsourcing your IT needs, you can focus on running your business, rather than
.png)
Ferris State ISI students, taking part unaffiliated, took six of the top 15 places, with second-year student Janek Vedock finishing first overall.
BIG RAPIDS, MI – To meet the growing national demand for skilled cybersecurity workers, Ferris State University is partnering with the...
After a two-year lawsuit, Muskegon County, Mich., must pay $230K to former contractor Ryan Leestma, who sued because the county shortchanged his company.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ISI Grand Rapids (Information Systems Intelligence) is http://www.isigr.com.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence)’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not certified under SOC 2 Type 1.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not listed as GDPR compliant.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) does not currently maintain PCI DSS compliance.
According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) is not compliant with HIPAA regulations.
According to Rankiteo,ISI Grand Rapids (Information Systems Intelligence) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ISI Grand Rapids (Information Systems Intelligence) operates primarily in the Computer Networking Products industry.
ISI Grand Rapids (Information Systems Intelligence) employs approximately 6 people worldwide.
ISI Grand Rapids (Information Systems Intelligence) presently has no subsidiaries across any sectors.
ISI Grand Rapids (Information Systems Intelligence)’s official LinkedIn profile has approximately 61 followers.
No, ISI Grand Rapids (Information Systems Intelligence) does not have a profile on Crunchbase.
Yes, ISI Grand Rapids (Information Systems Intelligence) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/information-systems-intelligence.
As of November 28, 2025, Rankiteo reports that ISI Grand Rapids (Information Systems Intelligence) has not experienced any cybersecurity incidents.
ISI Grand Rapids (Information Systems Intelligence) has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ISI Grand Rapids (Information Systems Intelligence) has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.