Comparison Overview

Museum of Arts & Sciences

VS

Royal Collection Trust

Museum of Arts & Sciences

352 S Nova Rd, Daytona Beach, US
Last Update: 2025-12-01
Between 750 and 799

The Museum of Arts & Sciences (MOAS) is the primary art, science and history museum in Central Florida. The area's largest museum, MOAS is nationally accredited by the American Alliance of Museums and is a Smithsonian Institution Affiliate. Located on a 90-acre Florida nature preserve, the 100,000 square foot facility is host to over 30,000 objects including the Dow Gallery of American Art, one of the finest collections of American art in the Southeast, the Schulte Gallery of Chinese Art, the Bouchelle Collection and Gallery of Decorative Arts, the largest and most comprehensive collection in the South, the Gillespy Gallery of Sub-Saharan African artifacts, the Cuban Foundation Museum showcasing one of the most significant collections of Cuban paintings in the United States, the Prehistory of Florida gallery featuring Florida’s Giant Ground Sloth skeleton and the Root Family Museum displaying restored railroad cars, antique automobiles and the largest collection of Coca-Cola® memorabilia in Florida. The Helene B. Roberson Visible Storage Building exhibits thousands of objects from many donors which are owned by the Museum, while the Linda and Williams Children’s Museum presents an interactive experience for children. A new state-of-the-art planetarium and the Cici and Hyatt Brown Museum of Art showcasing the largest collection of Florida-based art in the world, rounds out areas to explore inside the Museum of Arts & Sciences. Museum Hours are 10am-5pm (Monday-Saturday) and 11am-5pm (Sunday). Parking is free. Admission is FREE for Volusia County residents the first Tuesday of each month (does not include Planetarium shows). MOAS is fully accessible to the handicapped. MOAS is located at 352 S. Nova Road, Daytona Beach, Florida 32114. For more information call 386.255.0285 or visit the website www.moas.org.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 36
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Royal Collection Trust

Buckingham Palace, London, GB, SW1A 1AA
Last Update: 2025-12-01
Between 750 and 799

Royal Collection Trust is one of the five departments of the Royal Household. We care for the Royal Collection, one of the world's greatest art collections, and manage the public opening of the official residences of His Majesty The King – Buckingham Palace, Windsor Castle and the Palace of Holyroodhouse in Edinburgh. Our work is undertaken without public funding of any kind. Income generated from admissions, our shops and other commercial initiatives funds the conservation of the Royal Collection and projects to increase access to and enjoyment of the Collection, such as exhibitions, publications and educational programmes. We employ over 500 people in a wide range of roles, from conservators and curators to marketers and merchandisers. We also recruit around 350 summer staff each year to help our front-of-house teams create a memorable experience for millions of visitors from all over the world. With Royal Collection Trust, you will be trained, supported and inspired to achieve the highest standards. Collaboration is at the heart of what we do, and whatever your role, you will play a key part in ensuring that the Royal Collection and Palaces are valued and enjoyed by everyone.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 414
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/museum-of-arts-&-sciences.jpeg
Museum of Arts & Sciences
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/royal-collection-trust.jpeg
Royal Collection Trust
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Museum of Arts & Sciences
100%
Compliance Rate
0/4 Standards Verified
Royal Collection Trust
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Museum of Arts & Sciences in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Royal Collection Trust in 2025.

Incident History — Museum of Arts & Sciences (X = Date, Y = Severity)

Museum of Arts & Sciences cyber incidents detection timeline including parent company and subsidiaries

Incident History — Royal Collection Trust (X = Date, Y = Severity)

Royal Collection Trust cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/museum-of-arts-&-sciences.jpeg
Museum of Arts & Sciences
Incidents

No Incident

https://images.rankiteo.com/companyimages/royal-collection-trust.jpeg
Royal Collection Trust
Incidents

No Incident

FAQ

Royal Collection Trust company demonstrates a stronger AI Cybersecurity Score compared to Museum of Arts & Sciences company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Royal Collection Trust company has disclosed a higher number of cyber incidents compared to Museum of Arts & Sciences company.

In the current year, Royal Collection Trust company and Museum of Arts & Sciences company have not reported any cyber incidents.

Neither Royal Collection Trust company nor Museum of Arts & Sciences company has reported experiencing a ransomware attack publicly.

Neither Royal Collection Trust company nor Museum of Arts & Sciences company has reported experiencing a data breach publicly.

Neither Royal Collection Trust company nor Museum of Arts & Sciences company has reported experiencing targeted cyberattacks publicly.

Neither Museum of Arts & Sciences company nor Royal Collection Trust company has reported experiencing or disclosing vulnerabilities publicly.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Museum of Arts & Sciences company nor Royal Collection Trust company has publicly disclosed detailed information about the number of their subsidiaries.

Royal Collection Trust company employs more people globally than Museum of Arts & Sciences company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds SOC 2 Type 1 certification.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds SOC 2 Type 2 certification.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds ISO 27001 certification.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds PCI DSS certification.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds HIPAA certification.

Neither Museum of Arts & Sciences nor Royal Collection Trust holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X