Company Details
screentekct
3
72
323
screentek.net
0
SCR_1663992
In-progress

Screen Tek Printing Co Company CyberSecurity Posture
screentek.netScreen Tek is creativity, productivity, and dedication. We love what we do and we are passionate about our craft. You might say that we fall asleep thinking about custom t-shirts and we wake up from dreams of promotional products. Other companies might call us obsessive, but we like to call it enthusiastic and committed. Screen Tek works to make sure that you are satisfied with your order from start to finish and we create each product, t-shirt, logo, and banner with the utmost of care and attention to detail. Screen Tek is for everyone - businesses, non-profits, schools, and more. We are a creatively driven company who believes in family values and customer satisfaction, and that's what makes us different.
Company Details
screentekct
3
72
323
screentek.net
0
SCR_1663992
In-progress
Between 750 and 799

STPC Global Score (TPRM)XXXX



No incidents recorded for Screen Tek Printing Co in 2025.
No incidents recorded for Screen Tek Printing Co in 2025.
No incidents recorded for Screen Tek Printing Co in 2025.
STPC cyber incidents detection timeline including parent company and subsidiaries

Screen Tek is creativity, productivity, and dedication. We love what we do and we are passionate about our craft. You might say that we fall asleep thinking about custom t-shirts and we wake up from dreams of promotional products. Other companies might call us obsessive, but we like to call it enthusiastic and committed. Screen Tek works to make sure that you are satisfied with your order from start to finish and we create each product, t-shirt, logo, and banner with the utmost of care and attention to detail. Screen Tek is for everyone - businesses, non-profits, schools, and more. We are a creatively driven company who believes in family values and customer satisfaction, and that's what makes us different.


We specialize in print, design, technology, and outstanding US-based customer service. Primoprint was founded with one goal, to make the print buying experience better. We strive to simplify the ordering process for our customers, improve the production work-flow, and provide our team with the tools

Family run business since 1960s. Now run by Hugo and Jo Spiegl. We offer a personal service to ensure that you get the right product to suit your budget from the conception of your idea to the delivery of the printed product. We specialise in high end personal and business stationery - stuff with n

Automated Marking Inc. (AMI) a third generation company founded in 1903, is an international leader in the sales, service, and support of high-quality product identification and systems automation solutions. We specialize in advanced hardware, software, and consumables for coding and marking applica

sPrint Textile Decorations is active on the Romanian market since 2014 and is performing services with outstanding quality and unlimited added value, services for customers throughout Europe. The headquarters is situated in Baia Mare, in the Northern part of Romania, close to the Hungarian border,

You’ve got big ideas. Our attention-grabbing graphics can make your big ideas and projects shine. As the leading grand format printing company in the Southeast, Exploring Graphics has extensive experience and a wide scope of capabilities to fulfill all your digital printing needs. With 25+ years o

label.co.uk is a B2B label printing company that operates internationally in the Web2print sector. In addition to high quality printing, we offer individual advice, a creative design service and the possibility to calculate and order labels online. Thanks to the best print quality and transparent p
.png)
The tech layoff wave is still kicking in 2025. Last year saw more than 150,000 job cuts across 549 companies, according to independent...
You cannot ignore the print infrastructure and expect that malicious bad actors are going to ignore it as well,” HP Chief Technologist for...
We asked over 1,000 businesses about data breaches and their readiness to defend against them. Here's what we found. Written by
Cybersecurity strategies for businesses leveraging AI technologies focus on safeguarding sensitive data while maintaining compliance with regulatory standards.
Cybersecurity experts say more global tech outages like last week's are "inevitable" — and next time could be far worse...
The blue screen of death has been a dreaded symbol of technological failure since Microsoft's Windows became the world's dominant operating system in the 1990s.
Major airlines, media organizations and businesses around the world were affected by a massive IT glitch caused by a problem with cloud...
Airlines, hospitals and people's computers were affected after CrowdStrike, a cybersecurity company, sent out a flawed software update.
As COVID drove workers online, companies hired like crazy. Now tech giants are cutting jobs. Keep up to date with our tech layoffs tracker.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Screen Tek Printing Co is http://www.screentek.net/.
According to Rankiteo, Screen Tek Printing Co’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Screen Tek Printing Co currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Screen Tek Printing Co is not certified under SOC 2 Type 1.
According to Rankiteo, Screen Tek Printing Co does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Screen Tek Printing Co is not listed as GDPR compliant.
According to Rankiteo, Screen Tek Printing Co does not currently maintain PCI DSS compliance.
According to Rankiteo, Screen Tek Printing Co is not compliant with HIPAA regulations.
According to Rankiteo,Screen Tek Printing Co is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Screen Tek Printing Co operates primarily in the Printing Services industry.
Screen Tek Printing Co employs approximately 3 people worldwide.
Screen Tek Printing Co presently has no subsidiaries across any sectors.
Screen Tek Printing Co’s official LinkedIn profile has approximately 72 followers.
Screen Tek Printing Co is classified under the NAICS code 323, which corresponds to Printing and Related Support Activities.
No, Screen Tek Printing Co does not have a profile on Crunchbase.
Yes, Screen Tek Printing Co maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/screentekct.
As of December 17, 2025, Rankiteo reports that Screen Tek Printing Co has not experienced any cybersecurity incidents.
Screen Tek Printing Co has an estimated 5,157 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Screen Tek Printing Co has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.