Company Details
steelcase
8,708
319,458
337
steelcase.com
0
STE_2021355
In-progress

Steelcase Company CyberSecurity Posture
steelcase.comWork, at its best, is the wonder of what human beings can make possible. At Steelcase, we help people do their best work by creating places that work better. For over a century, we have designed, manufactured and partnered with the world’s leading organizations to create an expansive range of furnishings and solutions for all the places where work happens — including learning, health and working from home. We are driven to deeply understand the changing realities of work that our customers face. Through human-centered research and critical design-thinking, we uncover insights that lead us to innovation and breakthrough design. Our solutions come to life through talented design professionals and our Steelcase dealer community, who provide local expertise and tailored experiences with the global power of Steelcase. And because we recognize that we must do our best work for the places we all share, we stand together for people and the planet — using our business as a force for good to help the world work better.
Company Details
steelcase
8,708
319,458
337
steelcase.com
0
STE_2021355
In-progress
Between 700 and 749

Steelcase Global Score (TPRM)XXXX

Description: Office furniture giant Steelcase suffered a ransomware attack that forced them to shut down their network to contain the attack's spread. The Ryuk Ransomware threat actors utilized either the BazarLoader or TrickBot infections to compromise its network. However, the company soon engaged in restoring the affected systems and returning to normal levels of operation.


No incidents recorded for Steelcase in 2025.
No incidents recorded for Steelcase in 2025.
No incidents recorded for Steelcase in 2025.
Steelcase cyber incidents detection timeline including parent company and subsidiaries

Work, at its best, is the wonder of what human beings can make possible. At Steelcase, we help people do their best work by creating places that work better. For over a century, we have designed, manufactured and partnered with the world’s leading organizations to create an expansive range of furnishings and solutions for all the places where work happens — including learning, health and working from home. We are driven to deeply understand the changing realities of work that our customers face. Through human-centered research and critical design-thinking, we uncover insights that lead us to innovation and breakthrough design. Our solutions come to life through talented design professionals and our Steelcase dealer community, who provide local expertise and tailored experiences with the global power of Steelcase. And because we recognize that we must do our best work for the places we all share, we stand together for people and the planet — using our business as a force for good to help the world work better.


Home Zone Furniture is a family-owned furniture manufacturer and retailer based in the Dallas/Fort Worth area. Founded by Bree Barber, mother of four, Home Zone strives to bring customers furniture with style for everyone that anyone can afford. Bree saw an opportunity in the furniture industry to d

Welcome to Hardwood Artisans, where craftsmanship meets creativity in the heart of Culpeper County, Virginia. About Us: At Hardwood Artisans, we take pride in transforming premium hardwoods into timeless pieces of furniture that enhance your living spaces. With a passion for craftsmanship and an un

Home At Last, Inc is an upscale furniture and home accessory consignment store. Located only 1-1/2 miles off of Interstate 85 at the Pelham Road exit. HOME AT LAST is not a thrift store, flea market, or garage sale! Home at Last utilizes an excellent location for our showroom to display and sell

Founded in 1961, by Ivan Smith, Sr., Ivan Smith Furniture is a third-generation, family-owned business headquartered in Shreveport, Louisiana. Ivan Smith Furniture employs over 700 people and operates 48 stores in Arkansas, Louisiana, and Texas, of which 5 are Ashley Home Stores. A cornersto

Dekker Zevenhuizen is een familiebedrijf en al jarenlang toonaangevend in de Nederlandse woonmarkt. Ons bedrijf is verregaand gespecialiseerd in het bewerken van hoogwaardige materialen tot maatwerkbladen voor het hele interieur. U herkent de bladen aan de exclusieve kleuren en de strakke afwerking.

Telcar is best described as a well established, financially sound group of wholly owned and aligned companies with a specific objective in mind; provide well managed, seamless and a controlled portfolio of professional and competitive contract furnishings and support services. Delivering quality pro
.png)
Celebrate the life of Scott McKee, leave a kind word or memory and get funeral service information care of Cook Funeral Home & Cremation...
Steelcase's Karman High Back is the high-backed version of its popular, lightweight task chair that we loved, and it's just as good...
The ransomware gang behind the recent attack on Sopra Steria is making new headlines this week, this time for an attack on the world”s top office furniture...
Steelcase's Karman is a comfortable mesh task chair with a weight-activated frame that moves with your body and adapts to your posture.
The News: On Day 1 of Integrated Systems Europe (ISE) 2023, Logitech, in partnership with Steelcase, revealed their new video conferencing device code-named...
Zeeland-based automotive supplier Gentex Corp. suffered cyberattack several months ago, joining the growing ranks of manufacturers...
Web Application Firewalls strengthen the security performance of websites. Data breaches are expensive and can do irreversible damage to...
Office furniture giant Steelcase says that no information was stolen during a Ryuk ransomware attack that forced them to shut down global operations for...
A recent ransomware attack targeting furniture maker Steelcase Inc. caused the company to shut down operations for two weeks, according to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Steelcase is https://www.steelcase.com.
According to Rankiteo, Steelcase’s AI-generated cybersecurity score is 733, reflecting their Moderate security posture.
According to Rankiteo, Steelcase currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Steelcase is not certified under SOC 2 Type 1.
According to Rankiteo, Steelcase does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Steelcase is not listed as GDPR compliant.
According to Rankiteo, Steelcase does not currently maintain PCI DSS compliance.
According to Rankiteo, Steelcase is not compliant with HIPAA regulations.
According to Rankiteo,Steelcase is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Steelcase operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Steelcase employs approximately 8,708 people worldwide.
Steelcase presently has no subsidiaries across any sectors.
Steelcase’s official LinkedIn profile has approximately 319,458 followers.
Steelcase is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Steelcase does not have a profile on Crunchbase.
Yes, Steelcase maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/steelcase.
As of November 28, 2025, Rankiteo reports that Steelcase has experienced 1 cybersecurity incidents.
Steelcase has an estimated 2,617 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with network shutdown, and remediation measures with restoring affected systems..
Title: Steelcase Ransomware Attack
Description: Office furniture giant Steelcase suffered a ransomware attack that forced them to shut down their network to contain the attack's spread. The Ryuk Ransomware threat actors utilized either the BazarLoader or TrickBot infections to compromise its network. However, the company soon engaged in restoring the affected systems and returning to normal levels of operation.
Type: Ransomware
Attack Vector: BazarLoaderTrickBot
Threat Actor: Ryuk Ransomware
Motivation: Financial
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Entity Name: Steelcase
Entity Type: Corporation
Industry: Office Furniture

Containment Measures: Network shutdown
Remediation Measures: Restoring affected systems
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restoring affected systems.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by network shutdown.

Ransomware Strain: Ryuk
Last Attacking Group: The attacking group in the last incident was an Ryuk Ransomware.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Network shutdown.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.