Company Details
rock-ilsand-medical-trading-area-15
28
122
51125
sharedit.com
0
SHA_2343116
In-progress

Shared IT Inc Company CyberSecurity Posture
sharedit.comWe provide technology solutions that help clients meet their business objectives through a committed relationship that embraces the unique culture of each client setting. As Shared MED IT we Provide NextGen Software solutions through implementation, training, support, custom development , and services that embraces the unique culture of each client setting. As Shared Connect we utilize software and hardware to create custom solutions for our clients unique needs. Call us at 563.355.7473 or email at [email protected]
Company Details
rock-ilsand-medical-trading-area-15
28
122
51125
sharedit.com
0
SHA_2343116
In-progress
Between 750 and 799

SI Global Score (TPRM)XXXX



No incidents recorded for Shared IT Inc in 2025.
No incidents recorded for Shared IT Inc in 2025.
No incidents recorded for Shared IT Inc in 2025.
SI cyber incidents detection timeline including parent company and subsidiaries

We provide technology solutions that help clients meet their business objectives through a committed relationship that embraces the unique culture of each client setting. As Shared MED IT we Provide NextGen Software solutions through implementation, training, support, custom development , and services that embraces the unique culture of each client setting. As Shared Connect we utilize software and hardware to create custom solutions for our clients unique needs. Call us at 563.355.7473 or email at [email protected]


We help organisations construct large scale networks / distributed systems so that their performance and scalability properties are understood and can be managed. Our customers have ranged in size from 3 sites and 150 employees, to thousands of sites with 10+ million customers. They have include

Tenda Technology is a globally recognized manufacturer of highly popular networking devices for consumers and small-to-medium sized businesses. We are fully committed to our loyal customers around the world and will continue to produce easy-to-install and affordable networking solutions. Tenda produ

To put it simply, we’re a technology integration company that puts people ahead of technology. We listen to you and your needs before we offer any solutions. We talk about processes before processors. Frankly, we respect the fact that your business is unlike any other in your market. You have your o

Versa Technology, a Last Mile Network Technology company, was founded in 1994 with the vision to develop industry leading networking equipment. The unwavering mission of the company has always been to sell market industry-leading products that are the most versatile, user-friendly and cost effective

We take the SH out of IT. We are a Small Business Computer Consulting Company that helps grow your business by leveraging your existing technology to the maximum. We offer full IT solutions & services for small businesses. Our services include: Computer Repair: If you’re a small business looking t

Unicor S.A. es una empresa tecnológica de Argentina. Con mas de 18 años de experiencia brindando productos y soluciones en telecomunicaciones al lo largo y ancho del país. En Unicor asumimos el compromiso de brindar soluciones de calidad tanto en nuestros productos como servicios. Intentando estar a
.png)
SAN FRANCISCO, Nov. 19, 2025 (GLOBE NEWSWIRE) -- Investors in multi-cloud application services provider F5, Inc. (NASDAQ: FFIV) saw the...
Read Avantax Advisory Services Inc. Purchases 15460 Shares of First Trust Nasdaq Cybersecurity ETF $CIBR at Defense World.
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
Read Envestnet Portfolio Solutions Inc. Sells 357 Shares of Amplify Cybersecurity ETF $HACK at Defense World.
Discover why Netskope, Inc. leads in CASB & SASE with AI-driven security and strong growth. Click for more on NTSK stock and why I am...
Companies are expanding disclosures on artificial intelligence (AI) and cybersecurity governance as technology's role in business evolves.
SentinelOne, Inc.'s improving margins, free cash flow, & valuation present an attractive entry for patient growth investors.
PRNewswire/ -- IQSTEL Inc. (NASDAQ: IQST), a Global Connectivity, AI & Digital Corporation, today announced a key milestone in its expansion...
In the past week or so, some initial public offerings prompted big insider buying. One was a biopharmaceutical company and another a...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Shared IT Inc is http://www.sharedit.com.
According to Rankiteo, Shared IT Inc’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Shared IT Inc currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Shared IT Inc is not certified under SOC 2 Type 1.
According to Rankiteo, Shared IT Inc does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Shared IT Inc is not listed as GDPR compliant.
According to Rankiteo, Shared IT Inc does not currently maintain PCI DSS compliance.
According to Rankiteo, Shared IT Inc is not compliant with HIPAA regulations.
According to Rankiteo,Shared IT Inc is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Shared IT Inc operates primarily in the Computer Networking Products industry.
Shared IT Inc employs approximately 28 people worldwide.
Shared IT Inc presently has no subsidiaries across any sectors.
Shared IT Inc’s official LinkedIn profile has approximately 122 followers.
Shared IT Inc is classified under the NAICS code 51125, which corresponds to Software Publishers.
No, Shared IT Inc does not have a profile on Crunchbase.
Yes, Shared IT Inc maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rock-ilsand-medical-trading-area-15.
As of November 28, 2025, Rankiteo reports that Shared IT Inc has not experienced any cybersecurity incidents.
Shared IT Inc has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Shared IT Inc has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.