ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Sally Beauty Holdings, Inc. (“Sally”) through its affiliates is the world’s largest distributor of professional beauty supplies. Sally provides the channels that allow manufacturers of beauty supplies to reach customers, both professional and non-professional. Sally Beauty Company, Inc. began as a one-store operation in New Orleans, Louisiana in 1964. The Company expanded slowly until the 1980s, when it began to grow rapidly through acquisition and new store openings. In 1982, Sally moved its corporate headquarters to Denton, Texas following the acquisition of a Denton-based chain. In 1985, Sally acquired a major full-service (professional only) beauty supply distributor servicing the Midwestern United States. The growth of the full-service business led to the formation of the company now known as Beauty Systems Group LLC, focusing on distribution solely to the professional trade. New store openings and acquisitions continue to guide Sally’s expansion. In 1987, Sally became an international company with the acquisition of an affiliate in the United Kingdom. Today, Sally and its affiliates operate over 4500 stores throughout the United States and the world. Our international operations now extend to the United Kingdom, continental Europe, Puerto Rico, Canada, Chile, Peru, Colombia, Mexico. Both Sally Beauty Supply and Beauty Systems Group have successful and growing online (e-commerce) businesses. In 2006, Sally became a publicly held company with its shares traded on the New York Stock Exchange. Sally and its affiliates have long been industry leaders. Expertise in professional product merchandising, distribution and education provides the basis for a commanding presence in the global market. This, combined with strong domestic growth and international development, positions the companies for anticipated continuing success in future years. All subsidiaries and affiliates share Sally’s customer-driven operating philosophy and vision.

Sally Beauty A.I CyberSecurity Scoring

Sally Beauty

Company Details

Linkedin ID:

sally-beauty-company

Employees number:

11,514

Number of followers:

77,868

NAICS:

43

Industry Type:

Retail

Homepage:

sallybeauty.com

IP Addresses:

17

Company ID:

SAL_2746962

Scan Status:

Completed

AI scoreSally Beauty Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/sally-beauty-company.jpeg
Sally Beauty Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSally Beauty Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/sally-beauty-company.jpeg
Sally Beauty Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Sally Beauty Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Sally Beauty Holdings, Inc.Breach8543/2015
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: On May 28, 2015, the California Office of the Attorney General reported a data breach at Sally Beauty Holdings, Inc. The breach may have compromised payment card information between March 6 and April 17, 2015, affecting customers who used cards at U.S. stores. Specific details about the number of individuals affected were not provided.

Sally Beauty Holdings, Inc.
Breach
Severity: 85
Impact: 4
Seen: 3/2015
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: On May 28, 2015, the California Office of the Attorney General reported a data breach at Sally Beauty Holdings, Inc. The breach may have compromised payment card information between March 6 and April 17, 2015, affecting customers who used cards at U.S. stores. Specific details about the number of individuals affected were not provided.

Ailogo

Sally Beauty Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Sally Beauty

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Sally Beauty in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Sally Beauty in 2025.

Incident Types Sally Beauty vs Retail Industry Avg (This Year)

No incidents recorded for Sally Beauty in 2025.

Incident History — Sally Beauty (X = Date, Y = Severity)

Sally Beauty cyber incidents detection timeline including parent company and subsidiaries

Sally Beauty Company Subsidiaries

SubsidiaryImage

Sally Beauty Holdings, Inc. (“Sally”) through its affiliates is the world’s largest distributor of professional beauty supplies. Sally provides the channels that allow manufacturers of beauty supplies to reach customers, both professional and non-professional. Sally Beauty Company, Inc. began as a one-store operation in New Orleans, Louisiana in 1964. The Company expanded slowly until the 1980s, when it began to grow rapidly through acquisition and new store openings. In 1982, Sally moved its corporate headquarters to Denton, Texas following the acquisition of a Denton-based chain. In 1985, Sally acquired a major full-service (professional only) beauty supply distributor servicing the Midwestern United States. The growth of the full-service business led to the formation of the company now known as Beauty Systems Group LLC, focusing on distribution solely to the professional trade. New store openings and acquisitions continue to guide Sally’s expansion. In 1987, Sally became an international company with the acquisition of an affiliate in the United Kingdom. Today, Sally and its affiliates operate over 4500 stores throughout the United States and the world. Our international operations now extend to the United Kingdom, continental Europe, Puerto Rico, Canada, Chile, Peru, Colombia, Mexico. Both Sally Beauty Supply and Beauty Systems Group have successful and growing online (e-commerce) businesses. In 2006, Sally became a publicly held company with its shares traded on the New York Stock Exchange. Sally and its affiliates have long been industry leaders. Expertise in professional product merchandising, distribution and education provides the basis for a commanding presence in the global market. This, combined with strong domestic growth and international development, positions the companies for anticipated continuing success in future years. All subsidiaries and affiliates share Sally’s customer-driven operating philosophy and vision.

Loading...
similarCompanies

Sally Beauty Similar Companies

Jean Coutu

Fondé en 1969, le réseau Jean Coutu figure parmi les noms les plus réputés dans l’industrie canadienne de la vente au détail en pharmacie et compte un réseau de plus de 420 établissements franchisés au Québec, au Nouveau-Brunswick et en Ontario sous les bannières PJC Jean Coutu, PJC Santé et PJC San

Family Dollar

When it comes to getting value for everyday items for the entire family in an easy to shop, neighborhood location, Family Dollar is the best place to go. One of the nation’s fastest growing retailers, Family Dollar offers a compelling assortment of merchandise for the whole family ranging from house

Mr.Bricolage

Mr.Bricolage a de grands projets et vous en faîtes partie ! Enseigne connue et appréciée des Français, le Groupe Mr.Bricolage est un groupement d’adhérents-entrepreneurs indépendants, spécialistes de la rénovation et de l’embellissement de la maison et du jardin. Avec 1 091 magasins répartis en Fran

Reliance Digital

Reliance Digital is a Consumer Electronics, Durables, IT & Telecom retail arm of Reliance Retail Group with more than 1300+ stores across India. Reliance Digital seeks to fulfill the dream of every Indian, be it through its nationwide network of conveniently located stores or through its presenc

The Guitar Center Company

We exist so music can persist. Our family of brands has put more instruments into the hands of more people than anyone on the planet. Meet the family or, as we call them, The Guitar Center Company. Guitar Center. But there's more to us than guitars and basses. We carry all kinds of musical instrume

Al-Futtaim

Founded in the 1930s, Al-Futtaim has evolved into a leading conglomerate with a rich history of long-lasting and diverse expertise across automotive, retail, real estate, and finance sectors. As a family-owned business, we take a long-term view in everything we do because we believe that sustainable

Canadian Tire Corporation

Canadian Tire Corporation, Limited (“CTC”) is one of Canada’s most admired and trusted companies. With world-class owned brands and exciting market-leading merchandising strategies, we are continually innovating with purpose: to be there for Canadians from coast-to-coast. We are a group of compani

Kmart Australia Limited

We’re Team Kmart, on a mission to make everyday living brighter for our customers by improving the Kmart shopping experience – every time and everywhere they engage with us. For over fifty years now, we’ve been spreading the Kmart love to families of all shapes and sizes in Australia, then New Zea

Abercrombie & Fitch Co.

Abercrombie & Fitch Co. (NYSE: ANF) is a global, digitally led omnichannel specialty retailer of apparel and accessories catering to kids through millennials with assortments curated for their specific lifestyle needs. The company operates a family of brands, including Abercrombie brands and Holli

newsone

Sally Beauty CyberSecurity News

September 16, 2025 07:00 AM
Zacks.com featured highlights include Post Holdings, BuildABear Workshop, Equity Bancshares, Ardmore Shipping and Sally Beauty

Chicago, IL – September 16, 2022 – Stocks in this week's article are Post Holdings POST, BuildABear Workshop BBW, Equity Bancshares EQBK,...

September 26, 2024 07:00 AM
Infosys announces Strategic Collaboration with Sally Beauty to Bring Enterprise-scale IT Efficiencies from Hyper-automation

PRNewswire/ -- Infosys (NSE: INFY), (BSE: INFY), (NYSE: INFY), a global leader in next-generation digital services and consulting,...

November 16, 2023 12:37 AM
IT Security Stories to Watch: Sally Beauty Gets Breached

Sally Beauty Holdings (SBH) is investigating a data breach that may have affected 25000 customer records. And as a result, the professional beauty supplies...

June 16, 2023 08:00 PM
NRF Retail Law Summit

This free annual virtual Zoom event is a must-attend for retail in-house attorneys, risk and compliance officers, HR professionals and legal counsels and...

July 26, 2021 07:00 AM
Sally Beauty Holdings Appoints Erin Nealy Cox to the Board of Directors

DENTON, Texas–(BUSINESS WIRE)–Sally Beauty Holdings, Inc. (NYSE: SBH) today announced the appointment of Erin Nealy Cox, to the Board of...

May 13, 2021 07:00 AM
Here’s how much your personal information is worth to cybercriminals – and what they do with it

A thriving black market for stolen personal data makes millions of people vulnerable to spies, spammers, scammers and hackers.

August 16, 2017 04:45 PM
Sally Beauty Details POS Malware Attack

Sally Beauty Supply says that an "illegal intrusion" resulted in access to point-of-sale systems at some of its US stores for a six-week period beginning in...

August 16, 2017 12:25 PM
Sally Beauty: Breach Is Bigger

Cosmetics supplies retailer Sally Beauty now says more than 25000 records containing card data may have been illegally accessed and removed from its systems...

May 15, 2015 07:00 AM
Sally Beauty confirms second data breach

One of the largest US beauty supply retailers confirmed that customer payment card data was compromised in the second data breach at the company in roughly one...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Sally Beauty CyberSecurity History Information

Official Website of Sally Beauty

The official website of Sally Beauty is http://www.sallybeauty.com.

Sally Beauty’s AI-Generated Cybersecurity Score

According to Rankiteo, Sally Beauty’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.

How many security badges does Sally Beauty’ have ?

According to Rankiteo, Sally Beauty currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Sally Beauty have SOC 2 Type 1 certification ?

According to Rankiteo, Sally Beauty is not certified under SOC 2 Type 1.

Does Sally Beauty have SOC 2 Type 2 certification ?

According to Rankiteo, Sally Beauty does not hold a SOC 2 Type 2 certification.

Does Sally Beauty comply with GDPR ?

According to Rankiteo, Sally Beauty is not listed as GDPR compliant.

Does Sally Beauty have PCI DSS certification ?

According to Rankiteo, Sally Beauty does not currently maintain PCI DSS compliance.

Does Sally Beauty comply with HIPAA ?

According to Rankiteo, Sally Beauty is not compliant with HIPAA regulations.

Does Sally Beauty have ISO 27001 certification ?

According to Rankiteo,Sally Beauty is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Sally Beauty

Sally Beauty operates primarily in the Retail industry.

Number of Employees at Sally Beauty

Sally Beauty employs approximately 11,514 people worldwide.

Subsidiaries Owned by Sally Beauty

Sally Beauty presently has no subsidiaries across any sectors.

Sally Beauty’s LinkedIn Followers

Sally Beauty’s official LinkedIn profile has approximately 77,868 followers.

NAICS Classification of Sally Beauty

Sally Beauty is classified under the NAICS code 43, which corresponds to Retail Trade.

Sally Beauty’s Presence on Crunchbase

Yes, Sally Beauty has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/sally-beauty.

Sally Beauty’s Presence on LinkedIn

Yes, Sally Beauty maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sally-beauty-company.

Cybersecurity Incidents Involving Sally Beauty

As of November 27, 2025, Rankiteo reports that Sally Beauty has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Sally Beauty has an estimated 15,227 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Sally Beauty ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Sally Beauty Holdings, Inc.

Description: The breach may have compromised payment card information between March 6 and April 17, 2015, affecting customers who used cards at U.S. stores.

Date Detected: 2015-05-28

Date Publicly Disclosed: 2015-05-28

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach SAL224080425

Data Compromised: Payment card information

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card information.

Which entities were affected by each incident ?

Incident : Data Breach SAL224080425

Entity Name: Sally Beauty Holdings, Inc.

Entity Type: Retail

Industry: Beauty and Cosmetics

Location: United States

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach SAL224080425

Type of Data Compromised: Payment card information

Sensitivity of Data: High

References

Where can I find more information about each incident ?

Incident : Data Breach SAL224080425

Source: California Office of the Attorney General

Date Accessed: 2015-05-28

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2015-05-28.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2015-05-28.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2015-05-28.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Payment card information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Payment card information.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=sally-beauty-company' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge