Company Details
new-holland-church-furniture
33
212
337
newhollandwood.com
0
NEW_3276652
In-progress

New Holland Church Furniture Company CyberSecurity Posture
newhollandwood.comNew Holland Church Furniture was established in 1919 and is located in Lancaster County in the heart of Central Pennsylvania Dutch Country. We custom manufacture a full line of worship furniture including traditional church pews with standard or custom pew ends, and we are the nation’s leading manufacturer of radius curved pews with over 800 installations since 1962. Manufacturers of church furniture including pulpits, altars, clergy chairs and baptismal fonts, New Holland is focused on producing esthetically pleasing worship furniture of virtually any design. Our dedicated craftsman create uniquely custom pieces of worship furniture including retablos, reredos, and organ casework. We also manufacture a fine line of wood chairs, courtroom seating, custom synagogue furniture and synagogue seating. We would consider it a privilege to work with you and look forward to the opportunity to show you why we are “Setting the Industry Standard.”
Company Details
new-holland-church-furniture
33
212
337
newhollandwood.com
0
NEW_3276652
In-progress
Between 750 and 799

NHCF Global Score (TPRM)XXXX



No incidents recorded for New Holland Church Furniture in 2025.
No incidents recorded for New Holland Church Furniture in 2025.
No incidents recorded for New Holland Church Furniture in 2025.
NHCF cyber incidents detection timeline including parent company and subsidiaries

New Holland Church Furniture was established in 1919 and is located in Lancaster County in the heart of Central Pennsylvania Dutch Country. We custom manufacture a full line of worship furniture including traditional church pews with standard or custom pew ends, and we are the nation’s leading manufacturer of radius curved pews with over 800 installations since 1962. Manufacturers of church furniture including pulpits, altars, clergy chairs and baptismal fonts, New Holland is focused on producing esthetically pleasing worship furniture of virtually any design. Our dedicated craftsman create uniquely custom pieces of worship furniture including retablos, reredos, and organ casework. We also manufacture a fine line of wood chairs, courtroom seating, custom synagogue furniture and synagogue seating. We would consider it a privilege to work with you and look forward to the opportunity to show you why we are “Setting the Industry Standard.”


Since 1986, Custom Comfort Mattress has been building mattresses the old-fashioned way, using traditional construction methods and natural materials. We are a family business trusted by generations of families. We don’t take shortcuts. We go the long way. We build handcrafted, double-sided, natural

Wieland Designs builds beautiful products through reliable and fulfilling processes. We are true to the gifts of an interdependent, engaged team who are for each other – unified to serve each other and all those we influence. Wieland Designs is a leader in the design, engineering, supply management,

At Saneux we design and manufacture complete bathroom collections to the highest standards by using sustainable materials that have minimal impact on the environment. We ensure our products are made to the highest standards and our R&D keeps us on top of our game so we can offer the commercial sup

Our family owned furniture company in Colorado helps clients personalize, customize & love their style. We manufacture our own furniture in Longmont, CO ➳ Designers assist our clients for in-home design services and at our six locations ➳ Delivery drivers make our quality furniture a part of our cl

Geek Chic has been making lifestyle furniture for geeks since 2008-- starting with gaming tables, and expanding into other geek needs like comic storage, collectibles display, and office retrofitting. Each heirloom quality piece is handcrafted by a small team of dedicated woodworkers in a shop just

Kinnarps is a Swedish interior design company that offers innovative and inspiring total solutions for working environments. We are still a family owned company that today is the European leader in our industry and are represented in more than 40 countries. Our starting point is sustainability, well
.png)
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.
White Pearl Technology Group AB announced the successful integration of recent acquisitions in smart infrastructure, the establishment of a...
The programme will be delivered across India through a hybrid model, combining direct engagement with universities and collaboration with...
~Reaffirms Its Leadership as a CERT-In Empanelled Cybersecurity Partner for India's Digital Future~. New Delhi, India – November 28,...
AI is transforming cybersecurity workflows, from threat modeling to vulnerability prioritization, said Bill Chen, CISO at Natera, underlining the need for...
An update from Cyviz AS ( ($DE:8P9) ) is now available. Cyviz AS has entered into a new partner contract with IBM to modernize and upgrade...
Dubai, UAE : RNTrust Group announces a high-level GCC Cybersecurity Summit taking place in Dubai on Wednesday, December 10, 2025.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of New Holland Church Furniture is http://www.newhollandwood.com.
According to Rankiteo, New Holland Church Furniture’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, New Holland Church Furniture currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, New Holland Church Furniture is not certified under SOC 2 Type 1.
According to Rankiteo, New Holland Church Furniture does not hold a SOC 2 Type 2 certification.
According to Rankiteo, New Holland Church Furniture is not listed as GDPR compliant.
According to Rankiteo, New Holland Church Furniture does not currently maintain PCI DSS compliance.
According to Rankiteo, New Holland Church Furniture is not compliant with HIPAA regulations.
According to Rankiteo,New Holland Church Furniture is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
New Holland Church Furniture operates primarily in the Furniture and Home Furnishings Manufacturing industry.
New Holland Church Furniture employs approximately 33 people worldwide.
New Holland Church Furniture presently has no subsidiaries across any sectors.
New Holland Church Furniture’s official LinkedIn profile has approximately 212 followers.
New Holland Church Furniture is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, New Holland Church Furniture does not have a profile on Crunchbase.
Yes, New Holland Church Furniture maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/new-holland-church-furniture.
As of November 28, 2025, Rankiteo reports that New Holland Church Furniture has not experienced any cybersecurity incidents.
New Holland Church Furniture has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, New Holland Church Furniture has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.