Comparison Overview

MJF Group Ltd

VS

Cannon Hygiene International

MJF Group Ltd

Riverside Way Uxbridge, Middlesex UB8 2YF, GB
Last Update: 2025-05-06 (UTC)
Between 900 and 1000

Excellent

Welcome to MJF MJF Office โ— MJF Office Projects โ— MJF Business Relocations โ— MJF Records Management We are passionate about the business products and services we provide. MJF brings innovative and successful ways to deliver quality, bespoke business solutions to organisations throughout the UK. Driven by responsibility and integrity, we owe our successful growth to long term relationships with our clients. Over the years, we have extended our services to offer: furniture, office design and fit-out, relocations, records management and security guarding. Our products and services are used across the public and private sectors. We always ask: Can we add value? How can our range of services benefit you? Our business solutions aim to make a difference. Each of our divisions is empowered to run individually, yet we share ideas, ethics and goals. MJF represents unbeatable quality, innovation and value for money. Thatโ€™s why our customers come back for more. Talk to us: t: 0808 128 0001 e: [email protected]

NAICS: 5612
NAICS Definition: Facilities Support Services
Employees: 501-1,000
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Cannon Hygiene International

None
Last Update: 2025-03-17 (UTC)

Excellent

Between 900 and 1000

Cannon Hygiene is a leading provider of total washroom services, specialising in washroom hygiene. Today the companyโ€™s broad experience and extensive services and products serve the diverse needs of a wide range of businesses, from manufacturing and retail, through to the service, aviation and leisure sectors. Cannon Hygiene operates in over 40 countries worldwide and is currently expanding rapidly through a successful franchising operation. It is part of the OCS Group of companies, which employs over 90,000 people worldwide. As innovators in the industry, Cannon Hygiene is known for its commitment to quality and the on going development of products, services and people. We strive to distinguish ourselves from our competitors by offering the same high level of service excellence worldwide. Cannon Hygiene's Imagine Range, winner of the Good Design Award 2017. For more information visit www.cannonhygieneinternational.com and follow @Cannon_Hygiene on Twitter. โ€˜Cannon Hygiene โ€“ we aim to be the most hygienic washroom service in the worldโ€™

NAICS: 5612
NAICS Definition: Facilities Support Services
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
MJF Group Ltd
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/cannon-hygiene-international.jpeg
Cannon Hygiene International
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
MJF Group Ltd
100%
Compliance Rate
0/4 Standards Verified
Cannon Hygiene International
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Facilities Services Industry Average (This Year)

No incidents recorded for MJF Group Ltd in 2025.

Incidents vs Facilities Services Industry Average (This Year)

No incidents recorded for Cannon Hygiene International in 2025.

Incident History โ€” MJF Group Ltd (X = Date, Y = Severity)

MJF Group Ltd cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Cannon Hygiene International (X = Date, Y = Severity)

Cannon Hygiene International cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
MJF Group Ltd
Incidents

No Incident

https://images.rankiteo.com/companyimages/cannon-hygiene-international.jpeg
Cannon Hygiene International
Incidents

No Incident

FAQ

Both MJF Group Ltd company and Cannon Hygiene International company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Cannon Hygiene International company has disclosed a higher number of cyber incidents compared to MJF Group Ltd company.

In the current year, Cannon Hygiene International company and MJF Group Ltd company have not reported any cyber incidents.

Neither Cannon Hygiene International company nor MJF Group Ltd company has reported experiencing a ransomware attack publicly.

Neither Cannon Hygiene International company nor MJF Group Ltd company has reported experiencing a data breach publicly.

Neither Cannon Hygiene International company nor MJF Group Ltd company has reported experiencing targeted cyberattacks publicly.

Neither MJF Group Ltd company nor Cannon Hygiene International company has reported experiencing or disclosing vulnerabilities publicly.

Neither MJF Group Ltd company nor Cannon Hygiene International company has publicly disclosed detailed information about the number of their subsidiaries.

Neither MJF Group Ltd company nor Cannon Hygiene International company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type headers, lacks file content analysis and extension whitelist restrictions, allowing attackers to upload SVG files containing malicious scripts (disguised as images). When users access the uploaded resource pages, arbitrary JavaScript executes in their browsers. This issue is fixed in version 1.3.14.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.

Risk Information
cvss4
Base: 6.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.

Risk Information
cvss3
Base: 7.7
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.

Risk Information
cvss3
Base: 2.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N