ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

RED COATS, INC . was founded in 1960 by current Vice Chairman William F. Peel, and President Barbara K. Peel. Corporate headquarters are in our own mid-rise office building in Bethesda, Maryland, with regional branch offices in Baltimore, Florida, Southern Virginia and Durham/Raleigh under the leadership of the Executive Vice President, W. Mack Wells, Red Coats, Inc. consistently maintains the leadership of the custodial service industry throughout the markets we service. From our beginning in 1960, with several small accounts and a staff of only twelve employees, Red Coats, Inc. has grown to now provide professional custodial services to approximately 87 million square feet of residential, commercial, industrial, and institutional space on a daily basis. To accomplish the services required by our extensive and varied portfolio of customers, our staff has now grown in excess of 5,000 well-trained, personnel. The corporation also maintains affiliate companies providing security and other property management related services. Our professional services have assisted our customers in areas such as maintaining institutional accreditation and achieving numerous quality awards, including several Building Owners and Managers Association (BOMA) Building of the Year awards. Red Coats is committed to increasing levels of professional quality in our industry, and is active in many trade organizations toward this purpose.

Red Coats, Inc. A.I CyberSecurity Scoring

RCI

Company Details

Linkedin ID:

red-coats-inc.

Employees number:

362

Number of followers:

2,744

NAICS:

5612

Industry Type:

Facilities Services

Homepage:

redcoats.com

IP Addresses:

0

Company ID:

RED_3215335

Scan Status:

In-progress

AI scoreRCI Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/red-coats-inc..jpeg
RCI Facilities Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreRCI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/red-coats-inc..jpeg
RCI Facilities Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

RCI Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Red CoatsBreach8549/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: On September 19, 2025, Red Coats, a facilities services provider, disclosed a data breach to the Texas Attorney General’s office. The incident exposed **personally identifiable information (PII)**, including **names, addresses, Social Security numbers, and driver’s license numbers** of an unknown number of individuals. The breach impacted at least **1,737 Texas residents**, with estimates suggesting **several thousand current and former employees and contractors** across the U.S. were affected. The company is notifying impacted individuals via mail while complying with state and federal disclosure requirements. The breach involved **sensitive employee and contractor data**, raising concerns over identity theft, financial fraud, and reputational damage. No ransomware involvement was reported, but the scale and nature of the exposed data indicate a **significant internal and external data compromise**.

Red Coats
Breach
Severity: 85
Impact: 4
Seen: 9/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: On September 19, 2025, Red Coats, a facilities services provider, disclosed a data breach to the Texas Attorney General’s office. The incident exposed **personally identifiable information (PII)**, including **names, addresses, Social Security numbers, and driver’s license numbers** of an unknown number of individuals. The breach impacted at least **1,737 Texas residents**, with estimates suggesting **several thousand current and former employees and contractors** across the U.S. were affected. The company is notifying impacted individuals via mail while complying with state and federal disclosure requirements. The breach involved **sensitive employee and contractor data**, raising concerns over identity theft, financial fraud, and reputational damage. No ransomware involvement was reported, but the scale and nature of the exposed data indicate a **significant internal and external data compromise**.

Ailogo

RCI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for RCI

Incidents vs Facilities Services Industry Average (This Year)

Red Coats, Inc. has 25.0% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Red Coats, Inc. has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types RCI vs Facilities Services Industry Avg (This Year)

Red Coats, Inc. reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — RCI (X = Date, Y = Severity)

RCI cyber incidents detection timeline including parent company and subsidiaries

RCI Company Subsidiaries

SubsidiaryImage

RED COATS, INC . was founded in 1960 by current Vice Chairman William F. Peel, and President Barbara K. Peel. Corporate headquarters are in our own mid-rise office building in Bethesda, Maryland, with regional branch offices in Baltimore, Florida, Southern Virginia and Durham/Raleigh under the leadership of the Executive Vice President, W. Mack Wells, Red Coats, Inc. consistently maintains the leadership of the custodial service industry throughout the markets we service. From our beginning in 1960, with several small accounts and a staff of only twelve employees, Red Coats, Inc. has grown to now provide professional custodial services to approximately 87 million square feet of residential, commercial, industrial, and institutional space on a daily basis. To accomplish the services required by our extensive and varied portfolio of customers, our staff has now grown in excess of 5,000 well-trained, personnel. The corporation also maintains affiliate companies providing security and other property management related services. Our professional services have assisted our customers in areas such as maintaining institutional accreditation and achieving numerous quality awards, including several Building Owners and Managers Association (BOMA) Building of the Year awards. Red Coats is committed to increasing levels of professional quality in our industry, and is active in many trade organizations toward this purpose.

Loading...
similarCompanies

RCI Similar Companies

Onet is a family service group, born in Marseille around 1860. Our 74,000 employees are spread over more than 500 locations in 8 countries. The global business volume in 2019 is 2 billion euros. Our vision: We know that human beings are never better than several people and that the intelligence of

Grupo GPS

Fundado em 1962, em Salvador, o Grupo GPS é um grupo empresarial composto por empresas atuantes no mercado brasileiro de serviços indoor: GPS – Gerenciamento de segurança patrimonial Predial – Soluções em infra serviços In-Haus – Logística flexível traduzida em resultados Ecopolo – Referência para

Rete Ferroviaria Italiana

Rete Ferroviaria Italiana (RFI) is the Company of the Ferrovie dello Stato Group with the public role of Infrastructure Manager. As the body responsible for the track, the stations and the installations, RFI ensures to Italian railway undertakings the access to the railway network, performs the main

Mitie

Founded in 1987, Mitie is the UK’s leading facilities management and professional services company. We offer a range of specialist services including Security, Engineering Services, Cleaning, Landscaping, Energy and Property Consultancy, Property Maintenance, and Custody Support Services. Mitie emp

ISS Deutschland

Die ISS Facility Services Holding GmbH mit Sitz in Düsseldorf ist ein Tochterunternehmen der dänischen ISS A/S. Diese ist mit mehr als 470.000 Mitarbeitern der größte Facility Services-Anbieter weltweit. ISS hilft Nutzerinnen und Nutzern von Gebäuden und Liegenschaften auf der ganzen Welt, eff

Ambius United Kingdom

Ambius us the world's largest provider of plants, replica foliage and flowers for commercial environments. We not only specialise in designing, installing and servicing acclimatised, interior plants and pots, but also offer additional services such as exterior landscaping, flowers, artificial plan

Imdaad Group

Imdaad is a Dubai-based group of companies that provides integrated, sustainable facilities management services that enhance operational efficiencies of physical assets. Established in 2007, Imdaad’s suite of complete turnkey solutions includes Integrated FM, Hard FM, HomePro home maintenance, Visio

Globe Williams International

Established in Australia in 1999, Globe Williams International stands at the forefront of Total Integrated Facility Management Services, serving diverse industries globally. Our reach now spans 35 offices across Europe, the Asia Pacific, North America, and Africa, showcasing our commitment to innova

Ventia

Ventia provides essential services to make infrastructure work for communities in Australia and New Zealand. We pride ourselves on safe and sustainable services for our corporate and government clients across a broad range of sectors, including transport, telecommunications, utilities, defence, wa

newsone

RCI CyberSecurity News

September 30, 2025 07:00 AM
From Yellow Jackets to Red Flags: DOJ Stings Georgia Tech for Alleged Cybersecurity Noncompliance

On September 30, 2025, the Department of Justice (DOJ) announced that Georgia Tech Research Corporation (GTRC) agreed to pay $875000 to...

September 23, 2025 07:00 AM
Red Coats Inc. Data Breach Exposes Social Security Numbers

Data breach at Red Coats Inc. affects 1737 in Texas alone, exposing SSNs and driver's licenses. Learn how to protect your information.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

RCI CyberSecurity History Information

Official Website of Red Coats, Inc.

The official website of Red Coats, Inc. is http://www.redcoats.com.

Red Coats, Inc.’s AI-Generated Cybersecurity Score

According to Rankiteo, Red Coats, Inc.’s AI-generated cybersecurity score is 685, reflecting their Weak security posture.

How many security badges does Red Coats, Inc.’ have ?

According to Rankiteo, Red Coats, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Red Coats, Inc. have SOC 2 Type 1 certification ?

According to Rankiteo, Red Coats, Inc. is not certified under SOC 2 Type 1.

Does Red Coats, Inc. have SOC 2 Type 2 certification ?

According to Rankiteo, Red Coats, Inc. does not hold a SOC 2 Type 2 certification.

Does Red Coats, Inc. comply with GDPR ?

According to Rankiteo, Red Coats, Inc. is not listed as GDPR compliant.

Does Red Coats, Inc. have PCI DSS certification ?

According to Rankiteo, Red Coats, Inc. does not currently maintain PCI DSS compliance.

Does Red Coats, Inc. comply with HIPAA ?

According to Rankiteo, Red Coats, Inc. is not compliant with HIPAA regulations.

Does Red Coats, Inc. have ISO 27001 certification ?

According to Rankiteo,Red Coats, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Red Coats, Inc.

Red Coats, Inc. operates primarily in the Facilities Services industry.

Number of Employees at Red Coats, Inc.

Red Coats, Inc. employs approximately 362 people worldwide.

Subsidiaries Owned by Red Coats, Inc.

Red Coats, Inc. presently has no subsidiaries across any sectors.

Red Coats, Inc.’s LinkedIn Followers

Red Coats, Inc.’s official LinkedIn profile has approximately 2,744 followers.

NAICS Classification of Red Coats, Inc.

Red Coats, Inc. is classified under the NAICS code 5612, which corresponds to Facilities Support Services.

Red Coats, Inc.’s Presence on Crunchbase

No, Red Coats, Inc. does not have a profile on Crunchbase.

Red Coats, Inc.’s Presence on LinkedIn

Yes, Red Coats, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/red-coats-inc..

Cybersecurity Incidents Involving Red Coats, Inc.

As of December 18, 2025, Rankiteo reports that Red Coats, Inc. has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Red Coats, Inc. has an estimated 4,854 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Red Coats, Inc. ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Red Coats, Inc. detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (state/federal disclosures), and communication strategy with mail notifications to impacted individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Red Coats Data Breach (2025)

Description: On Sept. 19, 2025, Red Coats, a facilities services provider, disclosed a data breach to the Texas Attorney General’s office. The incident compromised personally identifiable information (PII) of an unknown number of individuals, including names, addresses, Social Security numbers, and driver’s license numbers. At least 1,737 Texas residents were confirmed affected, with several thousand current and former employees and contractors believed to be impacted nationwide.

Date Publicly Disclosed: 2025-09-19

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach RED1302713092425

Data Compromised: Names, Addresses, Social security numbers, Driver’s license numbers

Identity Theft Risk: High (PII exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii) and .

Which entities were affected by each incident ?

Incident : Data Breach RED1302713092425

Entity Name: Red Coats

Entity Type: Facilities Services Provider

Industry: Facilities Management

Location: United States (multiple regions)

Customers Affected: Several thousand (current/former employees and contractors); 1,737 confirmed in Texas

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach RED1302713092425

Incident Response Plan Activated: Yes (state/federal disclosures)

Communication Strategy: Mail notifications to impacted individuals

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (state/federal disclosures).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach RED1302713092425

Type of Data Compromised: Personally identifiable information (pii)

Number of Records Exposed: Unknown (minimum 1,737 in Texas; several thousand nationwide)

Sensitivity of Data: High

Data Exfiltration: Likely (PII exposed)

Personally Identifiable Information: namesaddressesSocial Security numbersdriver’s license numbers

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach RED1302713092425

Regulatory Notifications: Texas Attorney General’s officeFederal disclosures (unspecified)

References

Where can I find more information about each incident ?

Incident : Data Breach RED1302713092425

Source: Texas Attorney General’s Office - Data Security Breach Reports

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Texas Attorney General’s Office - Data Security Breach Reports.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach RED1302713092425

Investigation Status: Disclosed; ongoing notifications

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Mail notifications to impacted individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach RED1302713092425

Customer Advisories: Mail notifications to impacted individuals

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Mail notifications to impacted individuals.

Additional Questions

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-19.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, driver’s license numbers and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were driver’s license numbers, names, addresses and Social Security numbers.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.7K.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Texas Attorney General’s Office - Data Security Breach Reports.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed; ongoing notifications.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Mail notifications to impacted individuals.

cve

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=red-coats-inc.' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge