Comparison Overview

The Clean Bedroom

VS

James Richardson Furniture (JRF)

The Clean Bedroom

230 5th Ave, Lobby 10, New York, New York, US, 10001
Last Update: 2025-11-25

We offer the finest organic mattresses & bedding in the world, with showrooms in NYC, Portsmouth NH, MT Kisco NY, & Indianapolis. Featuring top-name brands such as Vispring, Obasan RoyalPedic, Savvy Rest, Naturepedic, Coyuchi, Sferra, Libeco, Austin Air, IQAir, Urban Woods, Mulberry West & more. Let us help you sleep healthy.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 14
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

James Richardson Furniture (JRF)

35-45 Lithgow Street, Abbotsford, 3067, AU
Last Update: 2025-11-22
Between 750 and 799

Grounded in a rich heritage and propelled by an unwavering commitment to a design-led vision, James Richardson Furniture have been expert in the commercial furniture business for close to 70 years. Finding quality design-led solutions for our esteemed clients has been at the forefront of our business since its inception in 1956. We have evolved from a direct sales model to a full FF&E advisory and procurement service, which will allow us to further and objectively support and optimise an end-to-end service for our valued partners. Our business is founded on a deep understanding and appreciation for the enduring legacy of design, and we welcome the opportunity to offer our knowledge, expertise and insight in a holistic capacity.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 8
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/the-clean-bedroom.jpeg
The Clean Bedroom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/james-richardson-furniture.jpeg
James Richardson Furniture (JRF)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
The Clean Bedroom
100%
Compliance Rate
0/4 Standards Verified
James Richardson Furniture (JRF)
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for The Clean Bedroom in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for James Richardson Furniture (JRF) in 2025.

Incident History — The Clean Bedroom (X = Date, Y = Severity)

The Clean Bedroom cyber incidents detection timeline including parent company and subsidiaries

Incident History — James Richardson Furniture (JRF) (X = Date, Y = Severity)

James Richardson Furniture (JRF) cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/the-clean-bedroom.jpeg
The Clean Bedroom
Incidents

No Incident

https://images.rankiteo.com/companyimages/james-richardson-furniture.jpeg
James Richardson Furniture (JRF)
Incidents

No Incident

FAQ

The Clean Bedroom company demonstrates a stronger AI Cybersecurity Score compared to James Richardson Furniture (JRF) company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, James Richardson Furniture (JRF) company has disclosed a higher number of cyber incidents compared to The Clean Bedroom company.

In the current year, James Richardson Furniture (JRF) company and The Clean Bedroom company have not reported any cyber incidents.

Neither James Richardson Furniture (JRF) company nor The Clean Bedroom company has reported experiencing a ransomware attack publicly.

Neither James Richardson Furniture (JRF) company nor The Clean Bedroom company has reported experiencing a data breach publicly.

Neither James Richardson Furniture (JRF) company nor The Clean Bedroom company has reported experiencing targeted cyberattacks publicly.

Neither The Clean Bedroom company nor James Richardson Furniture (JRF) company has reported experiencing or disclosing vulnerabilities publicly.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds any compliance certifications.

Neither company holds any compliance certifications.

James Richardson Furniture (JRF) company has more subsidiaries worldwide compared to The Clean Bedroom company.

The Clean Bedroom company employs more people globally than James Richardson Furniture (JRF) company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds SOC 2 Type 1 certification.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds SOC 2 Type 2 certification.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds ISO 27001 certification.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds PCI DSS certification.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds HIPAA certification.

Neither The Clean Bedroom nor James Richardson Furniture (JRF) holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.