Company Details
soscarolinas
13
828
337
stephensoffice.com
0
STE_1544948
In-progress

Stephens Office Systems Company CyberSecurity Posture
stephensoffice.comStephens Office Systems has been redefining modern offices since 1977. With over 200 years of team experience, SOS has grown to partner with over 250 manufacturers to pair every client with their ideal office design and furniture solution. Our headquarters in Charlotte houses a 50,000 sq. ft. showroom, filled with the latest products and designs that promise to revolutionize your space and the way that you work. Stephens Office Systems is proud to be Charlotte's leading Platinum Teknion Dealer, connecting clients with Teknion's groundbreaking office solutions each day. Our team is focused on building a partnership with each client, meeting their needs and scaling for the future as the needs of their company and team grow and evolve. At Stephens Office Systems, we're dedicated to finding the best office solutions for you every step of the way.
Company Details
soscarolinas
13
828
337
stephensoffice.com
0
STE_1544948
In-progress
Between 750 and 799

SOS Global Score (TPRM)XXXX



No incidents recorded for Stephens Office Systems in 2025.
No incidents recorded for Stephens Office Systems in 2025.
No incidents recorded for Stephens Office Systems in 2025.
SOS cyber incidents detection timeline including parent company and subsidiaries

Stephens Office Systems has been redefining modern offices since 1977. With over 200 years of team experience, SOS has grown to partner with over 250 manufacturers to pair every client with their ideal office design and furniture solution. Our headquarters in Charlotte houses a 50,000 sq. ft. showroom, filled with the latest products and designs that promise to revolutionize your space and the way that you work. Stephens Office Systems is proud to be Charlotte's leading Platinum Teknion Dealer, connecting clients with Teknion's groundbreaking office solutions each day. Our team is focused on building a partnership with each client, meeting their needs and scaling for the future as the needs of their company and team grow and evolve. At Stephens Office Systems, we're dedicated to finding the best office solutions for you every step of the way.


Resten offers a great alternative for outdoor furniture. Established in San Miguel de Allende, Mexico, we provide many options for beautiful exterior decoration. Our idea is to turn high quality art craft into very decorative, resistant, and extremely comfortable high end outdoor furniture. This

Burke Architectural Millwork is the first architectural millwork manufacturer in Michigan to gain the national certification through the Great Lakes Women's Business Council as a Women's Business Enterprise (WBE). Our company specializes in commercial space-making through manufacturing custom cabin

We empower people to do their smartest work and deliver the finishing touches to complete any space. We believe furnishing a high-performance workspace that reflects your brand and culture should be simple. Offering unique solutions at the right price, we provide you with a curated and complete port

Recognized for its mastery of upholstery craft, Nathan Anthony is a luxury furnishings resource for interior designers and upscale dealers. Award-winning designs are fully customizable and bench made-to-order at the company’s Los Angeles based production studio. Personalization options include frame

Driven by Design. Built for Real Life. At BDI, we believe great design should work as beautifully as it looks. Since 1984, we’ve been creating furniture that merges clean, modern aesthetics with thoughtful functionality—pieces that support the way people live, work, and relax today. From home ente

Draft Design Build, established in 2002. Designing, manufacturing and installing smart ICT furniture for education, commercial and home users. Draft Design Build is currently partnered with a number of key business and technology names in the manufacture and distribution of the product; including Ng
.png)
Discover how AI-powered threat detection revolutionizes cybersecurity with faster, more accurate protection against evolving threats.
A new air-gap attack dubbed 'SmartAttack' theorizes using a smartwatch to capture covert signals and steal information.
Cybersecurity company Goldilock has announced the opening of its first office in Singapore and Asia-Pacific headquarters on Monday (Jun 2), as part of a S$2...
DOGE representatives visited the National Labor Relations Board office in Washington, DC for a meeting, according to an email obtained by NPR.
UK announces new Laboratory for AI Security Research at NATO Cyber Defence Conference.
CLEVELAND — White House official Stephen Viña stressed the importance of trucking cybersecurity Oct. 28 even as carriers adapt to an unknown...
Stephen Miller has officially been confirmed as the seventh Chief Technology Officer (CTO) for Washington DC.
The role of our Executive Team is the effective day-to-day leadership, direction and management of the Met Office.
This month, another crisis broke the system, the Change Healthcare cyberattack. Change powers $1.5 trillion in healthcare payments annually.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Stephens Office Systems is http://www.stephensoffice.com.
According to Rankiteo, Stephens Office Systems’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Stephens Office Systems currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Stephens Office Systems is not certified under SOC 2 Type 1.
According to Rankiteo, Stephens Office Systems does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Stephens Office Systems is not listed as GDPR compliant.
According to Rankiteo, Stephens Office Systems does not currently maintain PCI DSS compliance.
According to Rankiteo, Stephens Office Systems is not compliant with HIPAA regulations.
According to Rankiteo,Stephens Office Systems is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Stephens Office Systems operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Stephens Office Systems employs approximately 13 people worldwide.
Stephens Office Systems presently has no subsidiaries across any sectors.
Stephens Office Systems’s official LinkedIn profile has approximately 828 followers.
Stephens Office Systems is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Stephens Office Systems does not have a profile on Crunchbase.
Yes, Stephens Office Systems maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/soscarolinas.
As of November 28, 2025, Rankiteo reports that Stephens Office Systems has not experienced any cybersecurity incidents.
Stephens Office Systems has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Stephens Office Systems has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.