ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

John-Richard, formed in 1980 as a subsidiary to one of the largest retail furniture operations in Mississippi. Starting with 5 employees and a 10,000-square-foot warehouse, the fledgling company had a sharp focus on wall décor, introducing their debut product line featuring 38 prints that showcased hand-colored engravings. Ten years later, a factory fire forced the company to relocate to a space a fraction of their original size. However, the company was quick to rebound with the launch of a 275,000-square-foot manufacturing facility and a 900,000-square-foot warehouse in Mississippi in addition to a manufacturing facility in Vietnam. John-Richard has since established facilities in India, China, and Vietnam, growing to 700 employees strong. In 2023, the company inaugurated a new Vietnam factory and relocated the corporate headquarters to North Carolina, as well as opening a new 250,000-square-foot distribution center. John-Richard has evolved into a leading resource for lighting, mirrors, accessories, furniture, upholstery, botanicals, and cutting-edge artwork. Our talented team of designers travel the globe in the pursuit of inspiration to deliver unique interpretations and sophisticated designs.

John-Richard A.I CyberSecurity Scoring

John-Richard

Company Details

Linkedin ID:

john-richard

Employees number:

127

Number of followers:

1,684

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

johnrichard.com

IP Addresses:

0

Company ID:

JOH_1675685

Scan Status:

In-progress

AI scoreJohn-Richard Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/john-richard.jpeg
John-Richard Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreJohn-Richard Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/john-richard.jpeg
John-Richard Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

John-Richard Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
John Richard Collection, LLCCyber Attack6021/2024
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Maine Office of the Attorney General reported a data breach involving The John Richard Collection, LLC on September 11, 2024. The breach, which was discovered on July 15, 2024, resulted from external hacking and affected a total of 2,382 individuals, including one Maine resident, with compromised information potentially including names and payment card details.

John Richard Collection, LLC
Cyber Attack
Severity: 60
Impact: 2
Seen: 1/2024
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: The Maine Office of the Attorney General reported a data breach involving The John Richard Collection, LLC on September 11, 2024. The breach, which was discovered on July 15, 2024, resulted from external hacking and affected a total of 2,382 individuals, including one Maine resident, with compromised information potentially including names and payment card details.

Ailogo

John-Richard Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for John-Richard

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for John-Richard in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for John-Richard in 2025.

Incident Types John-Richard vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for John-Richard in 2025.

Incident History — John-Richard (X = Date, Y = Severity)

John-Richard cyber incidents detection timeline including parent company and subsidiaries

John-Richard Company Subsidiaries

SubsidiaryImage

John-Richard, formed in 1980 as a subsidiary to one of the largest retail furniture operations in Mississippi. Starting with 5 employees and a 10,000-square-foot warehouse, the fledgling company had a sharp focus on wall décor, introducing their debut product line featuring 38 prints that showcased hand-colored engravings. Ten years later, a factory fire forced the company to relocate to a space a fraction of their original size. However, the company was quick to rebound with the launch of a 275,000-square-foot manufacturing facility and a 900,000-square-foot warehouse in Mississippi in addition to a manufacturing facility in Vietnam. John-Richard has since established facilities in India, China, and Vietnam, growing to 700 employees strong. In 2023, the company inaugurated a new Vietnam factory and relocated the corporate headquarters to North Carolina, as well as opening a new 250,000-square-foot distribution center. John-Richard has evolved into a leading resource for lighting, mirrors, accessories, furniture, upholstery, botanicals, and cutting-edge artwork. Our talented team of designers travel the globe in the pursuit of inspiration to deliver unique interpretations and sophisticated designs.

Loading...
similarCompanies

John-Richard Similar Companies

Since 2015, we have worked with designers and homeowners to give permanence to both the lasting looks and impeccable comfort of iconic mid-century pieces. From the timeless charm of our indoor staples to the progressive quality of our outdoor innovations, each piece is designed to encourage leisur

SKG Texas, Inc.

SKG is a Certified Platinum MillerKnoll Dealer based in Austin and San Antonio, serving clients nationwide. We have over 25 years of experience providing workspace design, commercial furniture, and architectural products for corporate, healthcare, government, technology and education workspaces. Cli

Imagia Furniture

Welcome to Imagia: A world of endless possibilities and creative expressions. Using furniture and accessories as our tool, let’s paint you a master piece that will bring more joy into your life, more peace of mind. IMAGIA is the leading furniture firm for top quality office furniture items in Nig

English Classics

English Classics is an dealer of fine English antique furniture and bench made English reproduction furniture. We are located in Atlanta, GA but ship throughout the US. We specialize in Georgian, Victorian, and Edwardian period antiques, vintage and reproduction leather and Chesterfields, and cust

ShenZhen KaiXinFeng Industrial Co.Ltd

ShenZhen KaiXinFeng Industrial Co.Ltd , located in ShenZhen, China, is a professional furniture manufacturer that has 20 years’ furniture manufacturing experience with a brand of “Triumph”. Our main products are a series of modern classic furniture, such as designer furniture, leisure chairs, sofas,

The Emporium

The Emporium features Early Settlement furniture. This involves the solid wood, hand crafted styles as made by Canada's early settlers. We specialize in unique designs and also do a great deal of custom work. The wood we use most is pine, new or reclaimed, although we also have maple pieces and can

newsone

John-Richard CyberSecurity News

October 19, 2025 07:00 AM
'There will never be another one like him': AIG's CEO on lessons learned from John Richard Harris

Peter Zaffino is Chairman & Chief Executive Officer of American International Group, Inc. (AIG), a leading global insurance company that...

June 20, 2025 07:00 AM
Top Pentagon spy pick rejected by White House

Army Lt. Gen. Richard Angle's name was put forward to lead the National Security Agency and U.S. Cyber Command.

April 17, 2025 07:00 AM
Mapping the Open-Source AI Debate: Cybersecurity Implications and Policy Priorities

This study examines the ongoing debate between open- and closed-source AI, assessing the trade-offs between openness, security, and innovation.

February 18, 2025 08:00 AM
Quantum computing, cyber security, quality food; Efforts to create centers of excellence will translate to jobs

John Goodhue, executive director of the Massachusetts Green High Performance Computing Center, has high hopes for the quantum computing...

December 02, 2024 08:00 AM
UK facing ‘widening gap’ in ability to fight cyber threats, warns top agency

The UK faces a “widening gap” in its ability to tackle cyber threats as AI and readily available technologies increase the scale and severity of attacks.

November 13, 2024 08:00 AM
Trump administration should focus on cyber rules, grants and international partnerships, Biden official says

The Trump administration should build a framework for minimum cybersecurity standards for critical infrastructure companies, establish cybersecurity grants for...

November 04, 2024 08:00 AM
Majority of cyberattacks are through third-party vendors

Cybersecurity experts John Riggi and Richard Staynings speak at the HIMSS Healthcare Cybersecurity Forum. Photo: HIMSSMedia.

October 26, 2024 07:00 AM
John Stengel Obituary October 26, 2024

John Matthew Stengel, born on February 7, 1977, in Hamilton, Ohio, departed this life on October 26, 2024, at his residence, surrounded by...

October 02, 2024 07:00 AM
America’s allies are shifting: Cyberspace is about persistence, not deterrence

Countries like the United Kingdom, Japan, and Canada are adopting the U.S.'s proactive cyber strategy, reflecting a shift away from...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

John-Richard CyberSecurity History Information

Official Website of John-Richard

The official website of John-Richard is https://www.johnrichard.com.

John-Richard’s AI-Generated Cybersecurity Score

According to Rankiteo, John-Richard’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.

How many security badges does John-Richard’ have ?

According to Rankiteo, John-Richard currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does John-Richard have SOC 2 Type 1 certification ?

According to Rankiteo, John-Richard is not certified under SOC 2 Type 1.

Does John-Richard have SOC 2 Type 2 certification ?

According to Rankiteo, John-Richard does not hold a SOC 2 Type 2 certification.

Does John-Richard comply with GDPR ?

According to Rankiteo, John-Richard is not listed as GDPR compliant.

Does John-Richard have PCI DSS certification ?

According to Rankiteo, John-Richard does not currently maintain PCI DSS compliance.

Does John-Richard comply with HIPAA ?

According to Rankiteo, John-Richard is not compliant with HIPAA regulations.

Does John-Richard have ISO 27001 certification ?

According to Rankiteo,John-Richard is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of John-Richard

John-Richard operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at John-Richard

John-Richard employs approximately 127 people worldwide.

Subsidiaries Owned by John-Richard

John-Richard presently has no subsidiaries across any sectors.

John-Richard’s LinkedIn Followers

John-Richard’s official LinkedIn profile has approximately 1,684 followers.

NAICS Classification of John-Richard

John-Richard is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.

John-Richard’s Presence on Crunchbase

No, John-Richard does not have a profile on Crunchbase.

John-Richard’s Presence on LinkedIn

Yes, John-Richard maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/john-richard.

Cybersecurity Incidents Involving John-Richard

As of November 28, 2025, Rankiteo reports that John-Richard has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

John-Richard has an estimated 2,616 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at John-Richard ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at The John Richard Collection, LLC

Description: The Maine Office of the Attorney General reported a data breach involving The John Richard Collection, LLC on September 11, 2024. The breach, which was discovered on July 15, 2024, resulted from external hacking and affected a total of 2,382 individuals, including one Maine resident, with compromised information potentially including names and payment card details.

Date Detected: 2024-07-15

Date Publicly Disclosed: 2024-09-11

Type: Data Breach

Attack Vector: External Hacking

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach JOH625080425

Data Compromised: Names, Payment card details

Payment Information Risk: True

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Payment Card Details and .

Which entities were affected by each incident ?

Incident : Data Breach JOH625080425

Entity Name: The John Richard Collection, LLC

Entity Type: Company

Customers Affected: 2382

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach JOH625080425

Type of Data Compromised: Names, Payment card details

Number of Records Exposed: 2382

References

Where can I find more information about each incident ?

Incident : Data Breach JOH625080425

Source: Maine Office of the Attorney General

Date Accessed: 2024-09-11

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-09-11.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-07-15.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-09-11.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, payment card details and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were payment card details and names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 240.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=john-richard' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge