Comparison Overview

Oklahoma Guardian Ad Litem Institute

VS

Goldblatt Partners LLP

Oklahoma Guardian Ad Litem Institute

1701 Signal Ridge Drive, Edmond, Oklahoma, 73013, US
Last Update: 2025-11-28

The Oklahoma Guardian Ad Litem Institute is a 501(c)3 non-profit organization here to help give the children in family law litigation a voice in the courtroom involving their care and custody. Our main mission is to advocate for the best interests of children in family law cases involving custody and visitation for children who are not in the custody of the Oklahoma Department of Human Services and for families who cannot otherwise afford to pay for private services due to lack of income. We do not provide services in cases in juvenile courts.

NAICS: 5411
NAICS Definition: Legal Services
Employees: 4
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Goldblatt Partners LLP

20 Dundas Street West, Suite 1039, Toronto, Ontario, M5G 2C2, CA
Last Update: 2025-11-28

For 50 years, Goldblatt Partners LLP has helped blaze a trail for working people and trade unions in Ontario. We represent unions and workers in all labour and and employment law matters, including grievance and interest arbitration, labour board proceedings, human rights claims, workplace health & safety applications, disability insurance claims, pay equity complaints and pension and benefits disputes. To complement our trade union practice, we established a civil litigation group which represents individuals, trade unions and professional organizations in all types of civil disputes, including wrongful dismissal actions. Our civil litigators also act for professionals, including teachers, lawyers and others, who are accused of misconduct or negligence. Our criminal law practitioners also complement our trade union practice. They advise trade unions and their members in police and child welfare investigations, and in relation to criminal charges connected to the workplace or to picket line disputes. Our criminal lawyers also act in national security certificate cases, and quasi-criminal law matters such as proceeds of crime litigation. The lawyers in our Aboriginal law group provide creative, cutting-edge representation for Aboriginal individuals, communities, institutions and governments to help them advance and protect their rights and interests. Finally, we are well-known for our appellate advocacy, including Charter of Rights and public interest litigation. We have been involved in many of the leading Charter cases in the labour and employment law field, advocating for employees’ freedom of association and expression. We have also been at the forefront of many equality rights cases, including virtually every Supreme Court of Canada case involving the rights of the LGBTQ community. In all cases, we strive to obtain the best possible results for our clients through strategic planning, skillful negotiation and advocacy, and forceful litigation.

NAICS: 5411
NAICS Definition: Legal Services
Employees: 106
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/oklahoma-guardian-ad-litem-institute.jpeg
Oklahoma Guardian Ad Litem Institute
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/goldblatt-partners-llp.jpeg
Goldblatt Partners LLP
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Oklahoma Guardian Ad Litem Institute
100%
Compliance Rate
0/4 Standards Verified
Goldblatt Partners LLP
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Oklahoma Guardian Ad Litem Institute in 2025.

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Goldblatt Partners LLP in 2025.

Incident History — Oklahoma Guardian Ad Litem Institute (X = Date, Y = Severity)

Oklahoma Guardian Ad Litem Institute cyber incidents detection timeline including parent company and subsidiaries

Incident History — Goldblatt Partners LLP (X = Date, Y = Severity)

Goldblatt Partners LLP cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/oklahoma-guardian-ad-litem-institute.jpeg
Oklahoma Guardian Ad Litem Institute
Incidents

No Incident

https://images.rankiteo.com/companyimages/goldblatt-partners-llp.jpeg
Goldblatt Partners LLP
Incidents

No Incident

FAQ

Oklahoma Guardian Ad Litem Institute company demonstrates a stronger AI Cybersecurity Score compared to Goldblatt Partners LLP company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Goldblatt Partners LLP company has disclosed a higher number of cyber incidents compared to Oklahoma Guardian Ad Litem Institute company.

In the current year, Goldblatt Partners LLP company and Oklahoma Guardian Ad Litem Institute company have not reported any cyber incidents.

Neither Goldblatt Partners LLP company nor Oklahoma Guardian Ad Litem Institute company has reported experiencing a ransomware attack publicly.

Neither Goldblatt Partners LLP company nor Oklahoma Guardian Ad Litem Institute company has reported experiencing a data breach publicly.

Neither Goldblatt Partners LLP company nor Oklahoma Guardian Ad Litem Institute company has reported experiencing targeted cyberattacks publicly.

Neither Oklahoma Guardian Ad Litem Institute company nor Goldblatt Partners LLP company has reported experiencing or disclosing vulnerabilities publicly.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Oklahoma Guardian Ad Litem Institute company nor Goldblatt Partners LLP company has publicly disclosed detailed information about the number of their subsidiaries.

Goldblatt Partners LLP company employs more people globally than Oklahoma Guardian Ad Litem Institute company, reflecting its scale as a Legal Services.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds SOC 2 Type 1 certification.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds SOC 2 Type 2 certification.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds ISO 27001 certification.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds PCI DSS certification.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds HIPAA certification.

Neither Oklahoma Guardian Ad Litem Institute nor Goldblatt Partners LLP holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X