Comparison Overview

Steelcase

VS

Home At Last, Inc

Steelcase

901 44th Street SE, Grand Rapids, Michigan, US, 49501-1967
Last Update: 2025-11-24
Between 700 and 749

Work, at its best, is the wonder of what human beings can make possible. At Steelcase, we help people do their best work by creating places that work better. For over a century, we have designed, manufactured and partnered with the world’s leading organizations to create an expansive range of furnishings and solutions for all the places where work happens — including learning, health and working from home. We are driven to deeply understand the changing realities of work that our customers face. Through human-centered research and critical design-thinking, we uncover insights that lead us to innovation and breakthrough design. Our solutions come to life through talented design professionals and our Steelcase dealer community, who provide local expertise and tailored experiences with the global power of Steelcase. And because we recognize that we must do our best work for the places we all share, we stand together for people and the planet — using our business as a force for good to help the world work better.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 8,708
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
1

Home At Last, Inc

None
Last Update: 2025-11-21
Between 800 and 849

Home At Last, Inc is an upscale furniture and home accessory consignment store. Located only 1-1/2 miles off of Interstate 85 at the Pelham Road exit. HOME AT LAST is not a thrift store, flea market, or garage sale! Home at Last utilizes an excellent location for our showroom to display and sell upscale, quality furnishings and home accessories, all with your convenience in mind. We are the oldest consignment furniture store in Greenville, SC. Our stock comes from the area's better homes. We maintain consignor contracts for 90 days resulting in a constant turnover of quality goods promoting high, repeat foot traffic.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 38
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/steelcase.jpeg
Steelcase
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Home At Last, Inc
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Steelcase
100%
Compliance Rate
0/4 Standards Verified
Home At Last, Inc
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Steelcase in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Home At Last, Inc in 2025.

Incident History — Steelcase (X = Date, Y = Severity)

Steelcase cyber incidents detection timeline including parent company and subsidiaries

Incident History — Home At Last, Inc (X = Date, Y = Severity)

Home At Last, Inc cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/steelcase.jpeg
Steelcase
Incidents

Date Detected: 10/2020
Type:Ransomware
Attack Vector: BazarLoader, TrickBot
Motivation: Financial
Blog: Blog
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Home At Last, Inc
Incidents

No Incident

FAQ

Home At Last, Inc company demonstrates a stronger AI Cybersecurity Score compared to Steelcase company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Steelcase company has historically faced a number of disclosed cyber incidents, whereas Home At Last, Inc company has not reported any.

In the current year, Home At Last, Inc company and Steelcase company have not reported any cyber incidents.

Steelcase company has confirmed experiencing a ransomware attack, while Home At Last, Inc company has not reported such incidents publicly.

Neither Home At Last, Inc company nor Steelcase company has reported experiencing a data breach publicly.

Neither Home At Last, Inc company nor Steelcase company has reported experiencing targeted cyberattacks publicly.

Neither Steelcase company nor Home At Last, Inc company has reported experiencing or disclosing vulnerabilities publicly.

Neither Steelcase nor Home At Last, Inc holds any compliance certifications.

Neither company holds any compliance certifications.

Steelcase company has more subsidiaries worldwide compared to Home At Last, Inc company.

Steelcase company employs more people globally than Home At Last, Inc company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither Steelcase nor Home At Last, Inc holds SOC 2 Type 1 certification.

Neither Steelcase nor Home At Last, Inc holds SOC 2 Type 2 certification.

Neither Steelcase nor Home At Last, Inc holds ISO 27001 certification.

Neither Steelcase nor Home At Last, Inc holds PCI DSS certification.

Neither Steelcase nor Home At Last, Inc holds HIPAA certification.

Neither Steelcase nor Home At Last, Inc holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.