Comparison Overview

Safeguard-Rick Stallings

VS

DisplayStar

Safeguard-Rick Stallings

5855 Coca Cola Blvd, Columbus, GA, 31909, US
Last Update: 2025-12-18

Our purpose is to help and support our clients in managing and growing their businesses, by providing them with high quality products and services - when they want it and how they want it! We will WOW our clients by serving them with highly qualified individuals that are passionate about our client's success.

NAICS: 323
NAICS Definition:
Employees: 12
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

DisplayStar

5465 SW Western Ave, Beaverton, OR, 97005, US
Last Update: 2025-12-17
Between 750 and 799

Factory-Direct Wholesale Trade Show Displays, banner stands, street pole banners, hanging banners and more. Customer service is our top priority at DisplayStar. Our clients are very pleased with the quality of our products and with the personal attention we provide. When you order from DisplayStar, your trade show display will arrive on time, and we know you'll be pleased with the decision you've made. Our clients are often pleasantly surprised by the quality of our trade show products. Our prices are so low when compared with our competitors that it is often hard to make customers believe that we are selling the same high quality products as our competitors. When our customers finally receive their display, any shred of doubt about the quality of our exhibits vanishes immediately.

NAICS: 323
NAICS Definition:
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/print-imaging-group.jpeg
Safeguard-Rick Stallings
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/displaystar.jpeg
DisplayStar
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Safeguard-Rick Stallings
100%
Compliance Rate
0/4 Standards Verified
DisplayStar
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Safeguard-Rick Stallings in 2025.

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for DisplayStar in 2025.

Incident History — Safeguard-Rick Stallings (X = Date, Y = Severity)

Safeguard-Rick Stallings cyber incidents detection timeline including parent company and subsidiaries

Incident History — DisplayStar (X = Date, Y = Severity)

DisplayStar cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/print-imaging-group.jpeg
Safeguard-Rick Stallings
Incidents
https://images.rankiteo.com/companyimages/displaystar.jpeg
DisplayStar
Incidents

No Incident

FAQ

Safeguard-Rick Stallings company demonstrates a stronger AI Cybersecurity Score compared to DisplayStar company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, DisplayStar company has disclosed a higher number of cyber incidents compared to Safeguard-Rick Stallings company.

In the current year, DisplayStar company and Safeguard-Rick Stallings company have not reported any cyber incidents.

Neither DisplayStar company nor Safeguard-Rick Stallings company has reported experiencing a ransomware attack publicly.

Neither DisplayStar company nor Safeguard-Rick Stallings company has reported experiencing a data breach publicly.

Neither DisplayStar company nor Safeguard-Rick Stallings company has reported experiencing targeted cyberattacks publicly.

Neither Safeguard-Rick Stallings company nor DisplayStar company has reported experiencing or disclosing vulnerabilities publicly.

Neither Safeguard-Rick Stallings nor DisplayStar holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Safeguard-Rick Stallings company nor DisplayStar company has publicly disclosed detailed information about the number of their subsidiaries.

Safeguard-Rick Stallings company employs more people globally than DisplayStar company, reflecting its scale as a Printing Services.

Neither Safeguard-Rick Stallings nor DisplayStar holds SOC 2 Type 1 certification.

Neither Safeguard-Rick Stallings nor DisplayStar holds SOC 2 Type 2 certification.

Neither Safeguard-Rick Stallings nor DisplayStar holds ISO 27001 certification.

Neither Safeguard-Rick Stallings nor DisplayStar holds PCI DSS certification.

Neither Safeguard-Rick Stallings nor DisplayStar holds HIPAA certification.

Neither Safeguard-Rick Stallings nor DisplayStar holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N