Comparison Overview

Paul Brayton Designs

VS

Scott Rice Office Interiors

Paul Brayton Designs

PO Box 7486, High Point, NC 27264, US
Last Update: 2025-11-28

Since 1993, Paul Brayton Designs has created an industry brand that designers trust to provide top quality textiles and furniture. -Lounge, guest seating, executive seating, collaborative and occasional tables. -Leather, faux leather and woven upholstery fabrics Each design is handcrafted for the interior designer and their clients using high quality materials and construction techniques.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 23
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Scott Rice Office Interiors

1425 E Douglas Ave , Wichita, 67211, US
Last Update: 2025-11-21

Scott Rice Office Interiors is in the business of providing productive workplace environments through the effective use of available space, carpet and office furnishings based on our customer's individual needs and objectives. We are a long time Steelcase dealer and Office Furniture USA franchisee. Affiliation with these two suppliers allows Scott Rice to offer the right products and services at the right price - this translates to customer value. Scott Rice Office Interiors is locally owned and committed to its employees, customers and the community. Scott Rice now offers promotional products for organizations wanting to create awareness, provide directional change, promote concepts to specific groups of employees or customers and provide employee incentives and recognition. We are proudly a "service disabled veteran owned business"

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/paul-brayton-designs.jpeg
Paul Brayton Designs
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/scott-rice-office-interiors.jpeg
Scott Rice Office Interiors
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Paul Brayton Designs
100%
Compliance Rate
0/4 Standards Verified
Scott Rice Office Interiors
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Paul Brayton Designs in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Scott Rice Office Interiors in 2025.

Incident History — Paul Brayton Designs (X = Date, Y = Severity)

Paul Brayton Designs cyber incidents detection timeline including parent company and subsidiaries

Incident History — Scott Rice Office Interiors (X = Date, Y = Severity)

Scott Rice Office Interiors cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/paul-brayton-designs.jpeg
Paul Brayton Designs
Incidents

No Incident

https://images.rankiteo.com/companyimages/scott-rice-office-interiors.jpeg
Scott Rice Office Interiors
Incidents

No Incident

FAQ

Scott Rice Office Interiors company demonstrates a stronger AI Cybersecurity Score compared to Paul Brayton Designs company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Scott Rice Office Interiors company has disclosed a higher number of cyber incidents compared to Paul Brayton Designs company.

In the current year, Scott Rice Office Interiors company and Paul Brayton Designs company have not reported any cyber incidents.

Neither Scott Rice Office Interiors company nor Paul Brayton Designs company has reported experiencing a ransomware attack publicly.

Neither Scott Rice Office Interiors company nor Paul Brayton Designs company has reported experiencing a data breach publicly.

Neither Scott Rice Office Interiors company nor Paul Brayton Designs company has reported experiencing targeted cyberattacks publicly.

Neither Paul Brayton Designs company nor Scott Rice Office Interiors company has reported experiencing or disclosing vulnerabilities publicly.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Paul Brayton Designs company nor Scott Rice Office Interiors company has publicly disclosed detailed information about the number of their subsidiaries.

Paul Brayton Designs company employs more people globally than Scott Rice Office Interiors company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds SOC 2 Type 1 certification.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds SOC 2 Type 2 certification.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds ISO 27001 certification.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds PCI DSS certification.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds HIPAA certification.

Neither Paul Brayton Designs nor Scott Rice Office Interiors holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.