ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

For over 35 years we have been providing our clients with the products and services that have helped them stay ahead of their competition. We are a leader in technology. Our ability to combine both digital and offset production methods to provide you with the best quality and cost effective document solutions is truly unique in our industry. Behind all of the technology and high tech equipment is one thing that truly sets us apart from all other printing companies. Our people. The folks that make up the Print King family are true experts in their individual fields. While each department may specialize in a different aspect of our business, they all come together as one team to produce the best end result for every client. Anyone can purchase the equipment to become a printer, but it’s the people in each department and their willingness to work as one unit that make us better. https://twitter.com/PrintKingInc https://www.instagram.com/printkinginc https://www.facebook.com/PrintKingInc

Print King, Inc. A.I CyberSecurity Scoring

PKI

Company Details

Linkedin ID:

print-king-inc.

Employees number:

11

Number of followers:

182

NAICS:

323

Industry Type:

Printing Services

Homepage:

printking.net

IP Addresses:

0

Company ID:

PRI_1703149

Scan Status:

In-progress

AI scorePKI Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/print-king-inc..jpeg
PKI Printing Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePKI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/print-king-inc..jpeg
PKI Printing Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PKI Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

PKI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PKI

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Print King, Inc. in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Print King, Inc. in 2025.

Incident Types PKI vs Printing Services Industry Avg (This Year)

No incidents recorded for Print King, Inc. in 2025.

Incident History — PKI (X = Date, Y = Severity)

PKI cyber incidents detection timeline including parent company and subsidiaries

PKI Company Subsidiaries

SubsidiaryImage

For over 35 years we have been providing our clients with the products and services that have helped them stay ahead of their competition. We are a leader in technology. Our ability to combine both digital and offset production methods to provide you with the best quality and cost effective document solutions is truly unique in our industry. Behind all of the technology and high tech equipment is one thing that truly sets us apart from all other printing companies. Our people. The folks that make up the Print King family are true experts in their individual fields. While each department may specialize in a different aspect of our business, they all come together as one team to produce the best end result for every client. Anyone can purchase the equipment to become a printer, but it’s the people in each department and their willingness to work as one unit that make us better. https://twitter.com/PrintKingInc https://www.instagram.com/printkinginc https://www.facebook.com/PrintKingInc

Loading...
similarCompanies

PKI Similar Companies

Speedpro Irving

Speedpro Irving is on the cusp of our 20th year of business, and we’ve gained a lot of valuable insight over that time. We’ve recognized how important sustainability and eco-friendliness are in the industry and have been lucky enough to garner relationships with commercial interior design agencies t

Kenney Printing Inc.

We provide multi-color printing, digital printing and letterpress crash printing for Saint Cloud, Minnesota and the surrounding areas. Our highly-trained professionals are trained to provide you with the solutions you need as well as the quality you deserve. We have made a strong presence in our

Keener Marketing, Inc.

Keener Marketing offers graphic design and marketing services to businesses and organizations across the nation. Our desire is to help your ministry achieve a professional image, no matter what your budget. On our website we provide samples and pricing details for many of our services including: log

Hygrade Business Group

Hygrade Business Group is a document management and marketing solution provider established in 1920. Our focus is helping our clients in the healthcare, banking and general business sectors by providing strategic business programs including print and document management services, healthcare technolo

Pro Laminators

Since 1984, Pro Laminators has served the printing and graphics arts industry by providing quality finishing services including One Side Laminating, Two Side Laminating, Index Tab Conversions, Transfer Tape Application and Special Request Finishing and Bindery Services. Printers, In-Plant Reprog

Flash Print

Fast turn around quality offset and digital printing. Long established printing company that is driven by people who know the trade and can assist you with all your printing requirements. Let us take the hassle out of your print needs and let you get on with the next job at hand

newsone

PKI CyberSecurity News

November 26, 2025 08:00 AM
Campbell's forced to respond to exec's alleged '3-D printed chicken' comment in soup diss

The Campbell's Company says that its soup is made from real meat -- not “3-D printed chicken," as an exec allegedly said in a shocking...

April 14, 2025 07:00 AM
Nasuni names former Veracode chief Sam King as new CEO - Bizwomen

King has returned as the new CEO of one of the biggest cybersecurity firms in Massachusetts. Nasuni is a cloud-technology cybersecurity company.

April 14, 2025 07:00 AM
Nasuni names former Veracode chief Sam King as new CEO - Bizwomen

King has returned as the new CEO of one of the biggest cybersecurity firms in Massachusetts. Nasuni is a cloud-technology cybersecurity company.

April 01, 2025 07:00 AM
Former Veracode CEO Sam King takes helm at Nasuni

King has returned as the new CEO of one of the biggest cybersecurity firms in Massachusetts. Nasuni is a cloud-technology cybersecurity company.

January 30, 2023 08:00 AM
A first-hand look inside Walmart’s robust security operations

The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart's operations speaks...

April 15, 2019 07:00 AM
Cybersecurity still key issue for record keepers

Defined contribution record keepers continued to focus on financial wellness, cybersecurity and digital engagement in 2018 — a year in which...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PKI CyberSecurity History Information

Official Website of Print King, Inc.

The official website of Print King, Inc. is http://www.printking.net.

Print King, Inc.’s AI-Generated Cybersecurity Score

According to Rankiteo, Print King, Inc.’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Print King, Inc.’ have ?

According to Rankiteo, Print King, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Print King, Inc. have SOC 2 Type 1 certification ?

According to Rankiteo, Print King, Inc. is not certified under SOC 2 Type 1.

Does Print King, Inc. have SOC 2 Type 2 certification ?

According to Rankiteo, Print King, Inc. does not hold a SOC 2 Type 2 certification.

Does Print King, Inc. comply with GDPR ?

According to Rankiteo, Print King, Inc. is not listed as GDPR compliant.

Does Print King, Inc. have PCI DSS certification ?

According to Rankiteo, Print King, Inc. does not currently maintain PCI DSS compliance.

Does Print King, Inc. comply with HIPAA ?

According to Rankiteo, Print King, Inc. is not compliant with HIPAA regulations.

Does Print King, Inc. have ISO 27001 certification ?

According to Rankiteo,Print King, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Print King, Inc.

Print King, Inc. operates primarily in the Printing Services industry.

Number of Employees at Print King, Inc.

Print King, Inc. employs approximately 11 people worldwide.

Subsidiaries Owned by Print King, Inc.

Print King, Inc. presently has no subsidiaries across any sectors.

Print King, Inc.’s LinkedIn Followers

Print King, Inc.’s official LinkedIn profile has approximately 182 followers.

Print King, Inc.’s Presence on Crunchbase

No, Print King, Inc. does not have a profile on Crunchbase.

Print King, Inc.’s Presence on LinkedIn

Yes, Print King, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/print-king-inc..

Cybersecurity Incidents Involving Print King, Inc.

As of December 17, 2025, Rankiteo reports that Print King, Inc. has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Print King, Inc. has an estimated 5,156 peer or competitor companies worldwide.

Print King, Inc. CyberSecurity History Information

How many cyber incidents has Print King, Inc. faced ?

Total Incidents: According to Rankiteo, Print King, Inc. has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Print King, Inc. ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=print-king-inc.' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge