Company Details
surfacetech
10
179
337
facility-concepts.com
0
SUR_4136610
In-progress

Surfacetech Company CyberSecurity Posture
facility-concepts.comSurfacetech stands as the contract furniture industry’s source for training and custom conference tables. With its plant still in Kansas City, Mo., Surfacetech manufactures veneer and laminate table tops with wood, vinyl and 3mm PVC edges. Bases for tables range from basic t, x and geometric shapes to more stylish and functional designs with the ability to store electrical as well as nest. Celebrating 35 years in business, Surfacetech is a family-owned business that prides itself on finding the right solution for any table need.
Company Details
surfacetech
10
179
337
facility-concepts.com
0
SUR_4136610
In-progress
Between 750 and 799

Surfacetech Global Score (TPRM)XXXX



No incidents recorded for Surfacetech in 2025.
No incidents recorded for Surfacetech in 2025.
No incidents recorded for Surfacetech in 2025.
Surfacetech cyber incidents detection timeline including parent company and subsidiaries

Surfacetech stands as the contract furniture industry’s source for training and custom conference tables. With its plant still in Kansas City, Mo., Surfacetech manufactures veneer and laminate table tops with wood, vinyl and 3mm PVC edges. Bases for tables range from basic t, x and geometric shapes to more stylish and functional designs with the ability to store electrical as well as nest. Celebrating 35 years in business, Surfacetech is a family-owned business that prides itself on finding the right solution for any table need.


United Group designs, engineers and manufactures purpose-seating products and distributes best-in-class seating solutions produced by the world's top manufacturers. The company, based in Lake Forest, Illinois, is comprised of two divisions, Ergonomic Office Chairs and Industrial Seats. Ergonomic
Trarem imagine sur mesure… à votre mesure. Trarem est reconnu, depuis 1957, comme le spécialiste de l’aménagement et de l’agencement des environnements de travail et, depuis deux ans, comme une nouvelle référence dans la conception des espaces de vie, sous la marque Trarem Life. Créative et enga

Lima Kitchens are an independent kitchen design and installation company supplying mid to high end kitchens to the Milton Keynes and surrounding areas. Kitchen projects with ourselves range from £15 000 - £80 000 depending on your exact requirements. As standard we offer a full design servic

Apricot Office Interiors, is a locally owned and operated business whose management and staff have served South Florida for over 20 years. Our commitment is to provide you with the very best in service, selection and savings. We are proud to offer you a better way to buy office furniture taking yo

Castle Furniture is a family owned and operated furniture company located in Tempe, Arizona. Established in 1993, Castle provides a variety of furniture rental packages, including custom home staging options. Castle also offers housewares rentals, which are processed in house in order to minimize

We create contemporary furniture for offices, homes and public spaces. We began in 1970 and from day one we have partnered with the world’s best designers. We exist to inspire. We look to fashion, art and architecture for our ideas. We have no set style, our ethos is to set trends, not follow them.
.png)
Each business day MSSP Alert delivers a quick lineup of news, analysis, and chatter from across the MSSP, MSP and cybersecurity world.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Surfacetech is http://www.surfacetech.com.
According to Rankiteo, Surfacetech’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Surfacetech currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Surfacetech is not certified under SOC 2 Type 1.
According to Rankiteo, Surfacetech does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Surfacetech is not listed as GDPR compliant.
According to Rankiteo, Surfacetech does not currently maintain PCI DSS compliance.
According to Rankiteo, Surfacetech is not compliant with HIPAA regulations.
According to Rankiteo,Surfacetech is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Surfacetech operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Surfacetech employs approximately 10 people worldwide.
Surfacetech presently has no subsidiaries across any sectors.
Surfacetech’s official LinkedIn profile has approximately 179 followers.
Surfacetech is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Surfacetech does not have a profile on Crunchbase.
Yes, Surfacetech maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/surfacetech.
As of November 28, 2025, Rankiteo reports that Surfacetech has not experienced any cybersecurity incidents.
Surfacetech has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Surfacetech has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.