Comparison Overview

Matthew Robbins Design

VS

Palmetto Automatic Sprinkler Company, Inc. PASCO

Matthew Robbins Design

None
Last Update: 2025-03-19 (UTC)

Excellent

Event Design, Planning, Production & Interior Design. For events we offer everything from beautiful flowers to lighting, linens and furniture. We also have an amazing collection of vintage objects and props available to our clients. We design events all over the world and also offer interior design services to some of our clients.

NAICS: None
NAICS Definition: Others
Employees: 9
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Palmetto Automatic Sprinkler Company, Inc. PASCO

1862 Old Dunbar Road, West Columbia, SC, 29172, US
Last Update: 2025-03-07 (UTC)

Excellent

Between 900 and 1000

PASCO is a fire suppression company that was founded in 1975 by the Mill family in West Columbia, SC. During these years, it has completed over 3,000 successful installations. It continues to expand now having additional offices in Charleston, SC, and Atlanta, GA. Serving organizations throughout the Southeast region of the United States, the company is now licensed for operations in the states of Alabama, Georgia, North Carolina, South Carolina, Virginia, and Tennessee. It remains a family-owned private business today under the direction or W.S. Scotty Mill. PASCO takes pride in offering outstanding service in a very timely fashion. Among its projects has been the tallest office building in South Carolina, the largest hospital, and the largest distribution facility under one roof in South Carolina. It received the Boeing Safety Award in 2011. OUR SERVICES INCLUDE: Automatic fire sprinkler system design Automatic fire sprinkler system installation Automatic fire sprinkler system service Maintenance, inspection, and testing of all automatic fire sprinkler systems Fire Alarm Inspection and Maintenance Fire Suppression System Inspection and Maintenance Fire Suppression Systems include: Halon, FM-200, CO2, Inergen, Novec 1230, Water Mist, and Foam Special hazards/chemical extinguishing and fire alarm service/inspection Consultation

NAICS: None
NAICS Definition:
Employees: 107
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Matthew Robbins Design
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/palmetto-automatic-sprinkler-company-inc-.jpeg
Palmetto Automatic Sprinkler Company, Inc. PASCO
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Matthew Robbins Design
100%
Compliance Rate
0/4 Standards Verified
Palmetto Automatic Sprinkler Company, Inc. PASCO
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Design Industry Average (This Year)

No incidents recorded for Matthew Robbins Design in 2025.

Incidents vs Design Industry Average (This Year)

No incidents recorded for Palmetto Automatic Sprinkler Company, Inc. PASCO in 2025.

Incident History โ€” Matthew Robbins Design (X = Date, Y = Severity)

Matthew Robbins Design cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Palmetto Automatic Sprinkler Company, Inc. PASCO (X = Date, Y = Severity)

Palmetto Automatic Sprinkler Company, Inc. PASCO cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Matthew Robbins Design
Incidents

No Incident

https://images.rankiteo.com/companyimages/palmetto-automatic-sprinkler-company-inc-.jpeg
Palmetto Automatic Sprinkler Company, Inc. PASCO
Incidents

No Incident

FAQ

Both Matthew Robbins Design company and Palmetto Automatic Sprinkler Company, Inc. PASCO company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Palmetto Automatic Sprinkler Company, Inc. PASCO company has disclosed a higher number of cyber incidents compared to Matthew Robbins Design company.

In the current year, Palmetto Automatic Sprinkler Company, Inc. PASCO company and Matthew Robbins Design company have not reported any cyber incidents.

Neither Palmetto Automatic Sprinkler Company, Inc. PASCO company nor Matthew Robbins Design company has reported experiencing a ransomware attack publicly.

Neither Palmetto Automatic Sprinkler Company, Inc. PASCO company nor Matthew Robbins Design company has reported experiencing a data breach publicly.

Neither Palmetto Automatic Sprinkler Company, Inc. PASCO company nor Matthew Robbins Design company has reported experiencing targeted cyberattacks publicly.

Neither Matthew Robbins Design company nor Palmetto Automatic Sprinkler Company, Inc. PASCO company has reported experiencing or disclosing vulnerabilities publicly.

Neither Matthew Robbins Design company nor Palmetto Automatic Sprinkler Company, Inc. PASCO company has publicly disclosed detailed information about the number of their subsidiaries.

Palmetto Automatic Sprinkler Company, Inc. PASCO company employs more people globally than Matthew Robbins Design company, reflecting its scale as a Design.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X