Comparison Overview

OFITA

VS

The Refinishing Touch®

OFITA

Pol. Ind. Betoño, c/ Escalmendi, 3., Vitoria-Gasteiz, 01013, ES
Last Update: 2025-11-26
Between 800 and 849

About Us Nearly 50 years leading the design and equipment of workplaces. Hand in hand with architects and interior designers in common projects.   Ofita is a benchmark in the manufacture of furniture for workplaces, office desks, office chairs, desks and cabinets. In most projects, we personalize the furniture according to the needs of each company, corporate culture and working methods. When people work in comfortable environments they bring out their very best. We work to make people proud of their work environment. Our challenge is to create spaces inviting to excellence, respecting the person and the environment and with an Innovation Centre at the service of our clients and collaborators. With 50,000m2 of industrial installations and showrooms worldwide, our challenge is to create spaces which invite to excellence, respecting the person and the environment. We understand the specific needs of each business to offer customized solutions and we collaborate with the architect and interior designer to make your ideas come true.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 43
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

The Refinishing Touch®

9350 Industrial Trace, Alpharetta, GA, 30004, US
Last Update: 2025-11-26

The Refinishing Touch is the definitive leader for on‐site, environmentally safe and sustainable furniture refinishing, restoration, and re-engineering for private and public entities, specifically Hospitality markets. Celebrating 48 years of operation and 8,000+ completed renovation projects, The Refinishing Touch® has redefined how these industries perceive furniture assets by providing savings on redesigns of up to 80%. • Furniture Refinishing with non-toxic, low-VOC and flame resistant finishes. • Furniture Reengineering and Remanufacturing • Solid Surface Replacement • Decorative Hardware Replacement • On-site work with virtually NO downtime

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 9
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ofita.jpeg
OFITA
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/the-refinishing-touch.jpeg
The Refinishing Touch®
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
OFITA
100%
Compliance Rate
0/4 Standards Verified
The Refinishing Touch®
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for OFITA in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for The Refinishing Touch® in 2025.

Incident History — OFITA (X = Date, Y = Severity)

OFITA cyber incidents detection timeline including parent company and subsidiaries

Incident History — The Refinishing Touch® (X = Date, Y = Severity)

The Refinishing Touch® cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ofita.jpeg
OFITA
Incidents

No Incident

https://images.rankiteo.com/companyimages/the-refinishing-touch.jpeg
The Refinishing Touch®
Incidents

No Incident

FAQ

OFITA company demonstrates a stronger AI Cybersecurity Score compared to The Refinishing Touch® company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, The Refinishing Touch® company has disclosed a higher number of cyber incidents compared to OFITA company.

In the current year, The Refinishing Touch® company and OFITA company have not reported any cyber incidents.

Neither The Refinishing Touch® company nor OFITA company has reported experiencing a ransomware attack publicly.

Neither The Refinishing Touch® company nor OFITA company has reported experiencing a data breach publicly.

Neither The Refinishing Touch® company nor OFITA company has reported experiencing targeted cyberattacks publicly.

Neither OFITA company nor The Refinishing Touch® company has reported experiencing or disclosing vulnerabilities publicly.

Neither OFITA nor The Refinishing Touch® holds any compliance certifications.

Neither company holds any compliance certifications.

Neither OFITA company nor The Refinishing Touch® company has publicly disclosed detailed information about the number of their subsidiaries.

OFITA company employs more people globally than The Refinishing Touch® company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither OFITA nor The Refinishing Touch® holds SOC 2 Type 1 certification.

Neither OFITA nor The Refinishing Touch® holds SOC 2 Type 2 certification.

Neither OFITA nor The Refinishing Touch® holds ISO 27001 certification.

Neither OFITA nor The Refinishing Touch® holds PCI DSS certification.

Neither OFITA nor The Refinishing Touch® holds HIPAA certification.

Neither OFITA nor The Refinishing Touch® holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.