Comparison Overview

Principal Financial Group

VS

Postal Savings Bank of China Co., Ltd.

Principal Financial Group

711 High St., Des Moines, Iowa, US, 50309
Last Update: 2025-12-09
Between 700 and 749

Principal Financial Group® is dedicated to improving the wealth and well-being of people and businesses around the world—helping more than 62M customers plan, protect, invest, and retire as of December 31, 2023. Along the way, we commit to supporting the communities where we do business. Improving our planet. And building a diverse, inclusive workforce. We’re proud to be recognized as a Best Place to Work in Money Management by Pensions & Investments for the 11th consecutive year, an Ethisphere World’s Most Ethical Companies for the 12th time and as Forbes The Best Employers for Diversity 2023. Disclosure: Insurance products issued by Principal National Life Insurance Company (except in NY) and Principal Life Insurance Company®. Plan administrative services offered by Principal Life. Principal Funds, Inc. is distributed by Principal Funds Distributor, Inc. Securities offered through Principal Securities, Inc., member SIPC and/or independent broker/dealers. Investment advisory services are offered through Principal Global Investors, LLC or its affiliates. Principal Asset Management℠ is a trade name of Principal Global Investors, LLC. Referenced companies are members of the Principal Financial Group®, Des Moines, IA 50392. ©2024 Principal Financial Services, Inc. Principal Financial Group Foundation, Inc. ("Principal® Foundation") is a duly recognized 501(c)(3) entity focused on providing philanthropic support to programs that build financial security in the communities where Principal Financial Group, Inc. ("Principal") operates. While Principal Foundation receives funding from Principal, Principal Foundation is a distinct, independent, charitable entity. Principal Foundation does not practice any form of investment advisory services and is not authorized to do so. https://www.principal.com/social-media-disclosures

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 23,643
Subsidiaries: 4
12-month incidents
0
Known data breaches
4
Attack type number
1

Postal Savings Bank of China Co., Ltd.

None
Last Update: 2025-12-09
Between 800 and 849

Postal Savings Bank of China Co., Ltd. also known as PSBC is a commercial retail bank founded in 2007 and headquartered in Beijing. It provides basic financial services, especially to small and medium enterprises, rural[1] and low income customers. As of December 31, 2017, PSBC has 39,798[2] branches covering all regions of China. PSBC was set up with an initial capital of RMB20 billion in 2007 from the State Post Bureau. Today it has RMB1.5 trillion in deposits and the second largest number of branches, after the Agricultural Bank of China. During the Global Financial Crisis, the government took several measures to spread its national economic stimulus plan specifically to rural areas. This included using microfinance services provided by the Postal Savings Bank as a tool for national development and poverty reduction. The bank with its extremely broad reach also assists China’s credit cooperatives in their microcredit schemes. On December 8, 2015, China Postal Savings Bank, through issuing pro-float stock, received an injection of investment from the Temasek Holdings of Singapore, UBS, the Canada Pension Plan Investment Board, the International Finance Corporation, Morgan Stanley, DBS Bank, Tencent, Ant Financial Services Group, China Life and China Telecom, with a total investment of 45.1 billion yuan. These "strategic investors" together held a 16.92% stake in the company at the time of purchase. The stock was listed through an initial public offering on the Stock Exchange of Hong Kong on September 30, 2016. Prior to its listing, it was the largest unlisted Chinese bank.[3] Xuewen Zhang and Hong Lao serve as Vice Presidents of the bank and co-executive directors.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 36
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/principalfinancialgroup.jpeg
Principal Financial Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/postal-savings-bank-of-china-co-ltd-,.jpeg
Postal Savings Bank of China Co., Ltd.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Principal Financial Group
100%
Compliance Rate
0/4 Standards Verified
Postal Savings Bank of China Co., Ltd.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Principal Financial Group in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Postal Savings Bank of China Co., Ltd. in 2025.

Incident History — Principal Financial Group (X = Date, Y = Severity)

Principal Financial Group cyber incidents detection timeline including parent company and subsidiaries

Incident History — Postal Savings Bank of China Co., Ltd. (X = Date, Y = Severity)

Postal Savings Bank of China Co., Ltd. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/principalfinancialgroup.jpeg
Principal Financial Group
Incidents

Date Detected: 2/2022
Type:Breach
Attack Vector: Inadvertent Disclosure
Blog: Blog

Date Detected: 7/2021
Type:Breach
Attack Vector: Human Error (Inadvertent Exposure via Social Media)
Blog: Blog

Date Detected: 5/2021
Type:Breach
Attack Vector: Inadvertent Disclosure
Blog: Blog
https://images.rankiteo.com/companyimages/postal-savings-bank-of-china-co-ltd-,.jpeg
Postal Savings Bank of China Co., Ltd.
Incidents

No Incident

FAQ

Postal Savings Bank of China Co., Ltd. company demonstrates a stronger AI Cybersecurity Score compared to Principal Financial Group company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Principal Financial Group company has historically faced a number of disclosed cyber incidents, whereas Postal Savings Bank of China Co., Ltd. company has not reported any.

In the current year, Postal Savings Bank of China Co., Ltd. company and Principal Financial Group company have not reported any cyber incidents.

Neither Postal Savings Bank of China Co., Ltd. company nor Principal Financial Group company has reported experiencing a ransomware attack publicly.

Principal Financial Group company has disclosed at least one data breach, while the other Postal Savings Bank of China Co., Ltd. company has not reported such incidents publicly.

Neither Postal Savings Bank of China Co., Ltd. company nor Principal Financial Group company has reported experiencing targeted cyberattacks publicly.

Neither Principal Financial Group company nor Postal Savings Bank of China Co., Ltd. company has reported experiencing or disclosing vulnerabilities publicly.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds any compliance certifications.

Neither company holds any compliance certifications.

Principal Financial Group company has more subsidiaries worldwide compared to Postal Savings Bank of China Co., Ltd. company.

Principal Financial Group company employs more people globally than Postal Savings Bank of China Co., Ltd. company, reflecting its scale as a Financial Services.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds SOC 2 Type 1 certification.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds SOC 2 Type 2 certification.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds ISO 27001 certification.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds PCI DSS certification.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds HIPAA certification.

Neither Principal Financial Group nor Postal Savings Bank of China Co., Ltd. holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F handlers allow a specially crafted disc image or ELF to cause an out-of-bounds read from emulator memory. Because the offset and size is controlled through MG header fields, a specially crafted ELF can read data beyond the bounds of mg_buffer and have it reflected back into emulated memory. This issue is fixed in version 2.5.378.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=zone. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X