Comparison Overview

Moneytree

VS

Old Mutual

Moneytree

undefined, Seattle, undefined, undefined, us
Last Update: 2025-12-09
Between 700 and 749

Moneytree is a family-owned business and a leader in the financial services industry. We’ve been helping customers since 1983 with short-term loans, check cashing services, and more. We operate online and have retail branches located throughout Southern California, Colorado, Idaho, Nevada, Washington, and British Columbia, Canada. At Moneytree, we believe in our customers. Our goal is to provide an exceptional customer experience during every interaction. This philosophy extends to how we treat our Team Members too. We invest in our Team Members and provide them with rewarding career opportunities in a fun and professional work environment. We also believe in helping our neighbors by giving back to worthy causes in our communities. If you share these values and are looking for a career where you can learn and advance, help others, and make a difference every day, we’re looking for you too! It’s time to explore what working at Moneytree could mean for you. We offer very competitive wages, growth opportunities, work-from-home opportunities, and excellent benefits! Open the door to a great future, and find out more about Moneytree by applying today.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 395
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Old Mutual

107 Rivonia Rd, Johannesburg, Gauteng, undefined, ZA
Last Update: 2025-12-09
Between 750 and 799

Old Mutual Limited is a listed company on the Johannesburg Stock Exchange and has secondary listings on the London, Malawi, Namibia and Zimbabwe stock exchanges. As a Pan-African financial services company, we are focused on Africa, her needs and her people. Together with you, we have educated our children, given more homes warmth and light, empowered small businesses and improved infrastructure in Africa. Our story will continue #WithAfricaForAfrica.

NAICS: 52
NAICS Definition:
Employees: 12,699
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/moneytree.jpeg
Moneytree
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/old-mutual.jpeg
Old Mutual
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Moneytree
100%
Compliance Rate
0/4 Standards Verified
Old Mutual
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Moneytree in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Old Mutual in 2025.

Incident History — Moneytree (X = Date, Y = Severity)

Moneytree cyber incidents detection timeline including parent company and subsidiaries

Incident History — Old Mutual (X = Date, Y = Severity)

Old Mutual cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/moneytree.jpeg
Moneytree
Incidents

Date Detected: 3/2016
Type:Breach
Motivation: Data Theft
Blog: Blog
https://images.rankiteo.com/companyimages/old-mutual.jpeg
Old Mutual
Incidents

No Incident

FAQ

Old Mutual company demonstrates a stronger AI Cybersecurity Score compared to Moneytree company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Moneytree company has historically faced a number of disclosed cyber incidents, whereas Old Mutual company has not reported any.

In the current year, Old Mutual company and Moneytree company have not reported any cyber incidents.

Neither Old Mutual company nor Moneytree company has reported experiencing a ransomware attack publicly.

Moneytree company has disclosed at least one data breach, while the other Old Mutual company has not reported such incidents publicly.

Neither Old Mutual company nor Moneytree company has reported experiencing targeted cyberattacks publicly.

Neither Moneytree company nor Old Mutual company has reported experiencing or disclosing vulnerabilities publicly.

Neither Moneytree nor Old Mutual holds any compliance certifications.

Neither company holds any compliance certifications.

Old Mutual company has more subsidiaries worldwide compared to Moneytree company.

Old Mutual company employs more people globally than Moneytree company, reflecting its scale as a Financial Services.

Neither Moneytree nor Old Mutual holds SOC 2 Type 1 certification.

Neither Moneytree nor Old Mutual holds SOC 2 Type 2 certification.

Neither Moneytree nor Old Mutual holds ISO 27001 certification.

Neither Moneytree nor Old Mutual holds PCI DSS certification.

Neither Moneytree nor Old Mutual holds HIPAA certification.

Neither Moneytree nor Old Mutual holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X