Company Details
maryland-business-interiors
6
16
337
marylandbusinessinterior.com
0
MAR_4012966
In-progress

Maryland Business Interiors Company CyberSecurity Posture
marylandbusinessinterior.comContract Office furniture dealer offering furniture, architectural products, space planning, laboratory casework, installation & delivery services. We are a certified Woman-Owned Small Business and work teaming agreements with an 8A/SDVO/HUBZone company marketing to commercial business and the federal government in the MD/DC/VA markets. We truely focus on the customer experience by employing the KISS methods.
Company Details
maryland-business-interiors
6
16
337
marylandbusinessinterior.com
0
MAR_4012966
In-progress
Between 750 and 799

MBI Global Score (TPRM)XXXX



No incidents recorded for Maryland Business Interiors in 2025.
No incidents recorded for Maryland Business Interiors in 2025.
No incidents recorded for Maryland Business Interiors in 2025.
MBI cyber incidents detection timeline including parent company and subsidiaries

Contract Office furniture dealer offering furniture, architectural products, space planning, laboratory casework, installation & delivery services. We are a certified Woman-Owned Small Business and work teaming agreements with an 8A/SDVO/HUBZone company marketing to commercial business and the federal government in the MD/DC/VA markets. We truely focus on the customer experience by employing the KISS methods.


Alaska's Premier Leather and Fine Furniture Showroom. Quality, Simple, Modern. Voted "Best Furniture Store in Alaska" in Alaska Dispatch News' Best of Alaska 2014 Awards. Treeforms carries a wide selection of some of the world’s best sleep solution and home furnishing brands in a variety of

For over 50 years, Renray Healthcare has been designing, manufacturing, and supplying high-quality healthcare furniture and pressure area care (PAC) products to care homes, the NHS, and specialist care environments. Our focus is on creating safe, comfortable, and practical spaces that improve quali

Sourcing manufacturing companies in Bali. Oktapoenya Teamwork production our own products, we can also source many types of craft from Java, Bali, Lombok and other areas in Indonesia. We have an extensive network of rural indigenous craftsmen and small factories on the island of Java, Bali and Lombo

Office Source is a full service furniture provider. We supply and manage office furniture solutions to create and support productive workplace environments for today's challenging business climate. We work with clients, designers, architects and project managers to ensure that any investment in

Dagiga specializes in the design and manufacture of #1 healthcare quality thermofoil components for kitchen, residential and medical facility architects, store outfitters, property developers and custom millworkers. All of our components are manufactured by our qualified engineers who have 15+ years

John-Richard, formed in 1980 as a subsidiary to one of the largest retail furniture operations in Mississippi. Starting with 5 employees and a 10,000-square-foot warehouse, the fledgling company had a sharp focus on wall décor, introducing their debut product line featuring 38 prints that showcased
.png)
Howard County Executive Calvin Ball has returned from an 11-day diplomatic European Trade Mission, where he joined a delegation of Howard County...
Columbia, Maryland-based cybersecurity company Owl Cyber Defense Solutions LLC announced Tuesday it has acquired Fairfax-based Trident's Assured...
Maryland Sen. Ben Cardin is retiring from the Senate next year. For now, here's how he's working to improve small businesses' cybersecurity.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Maryland Business Interiors is http://www.marylandbusinessinterior.com.
According to Rankiteo, Maryland Business Interiors’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.
According to Rankiteo, Maryland Business Interiors currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Maryland Business Interiors is not certified under SOC 2 Type 1.
According to Rankiteo, Maryland Business Interiors does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Maryland Business Interiors is not listed as GDPR compliant.
According to Rankiteo, Maryland Business Interiors does not currently maintain PCI DSS compliance.
According to Rankiteo, Maryland Business Interiors is not compliant with HIPAA regulations.
According to Rankiteo,Maryland Business Interiors is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Maryland Business Interiors operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Maryland Business Interiors employs approximately 6 people worldwide.
Maryland Business Interiors presently has no subsidiaries across any sectors.
Maryland Business Interiors’s official LinkedIn profile has approximately 16 followers.
Maryland Business Interiors is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Maryland Business Interiors does not have a profile on Crunchbase.
Yes, Maryland Business Interiors maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/maryland-business-interiors.
As of November 28, 2025, Rankiteo reports that Maryland Business Interiors has not experienced any cybersecurity incidents.
Maryland Business Interiors has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Maryland Business Interiors has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.