Company Details
the-contract-chair-company
38
2,340
337
thecontractchair.co.uk
0
CON_3625295
In-progress

Contract Chair Co. Company CyberSecurity Posture
thecontractchair.co.ukThe Contract Chair Company is a family business, owned and managed by two cousins (Charles Nicholson, MD and James Ketteringham, Sales Director). Our home is a 5,000 square foot working showroom in Hammersmith, which we built in 2011. We have sample furniture galore, fabric books, wood samples and everything you need to choose hospitality furniture. Our furniture is mainly from factories in Italy, although countries in Eastern Europe are becoming more important; we try to use UK factories when possible. We are striving to become the best in the industry. We believe that our location is an advantage and we pride ourselves on the service we provide - you will be looked after by a dedicated sales team. We aspire to provide an excellent after-sales service; prompt delivery and efficient installation are a very big part of the business and our installation team are second-to-none. Please explore our website - you will find that you can see pictures of us all on it - or contact us with specific product enquiries.
Company Details
the-contract-chair-company
38
2,340
337
thecontractchair.co.uk
0
CON_3625295
In-progress
Between 750 and 799

CCC Global Score (TPRM)XXXX



No incidents recorded for Contract Chair Co. in 2025.
No incidents recorded for Contract Chair Co. in 2025.
No incidents recorded for Contract Chair Co. in 2025.
CCC cyber incidents detection timeline including parent company and subsidiaries

The Contract Chair Company is a family business, owned and managed by two cousins (Charles Nicholson, MD and James Ketteringham, Sales Director). Our home is a 5,000 square foot working showroom in Hammersmith, which we built in 2011. We have sample furniture galore, fabric books, wood samples and everything you need to choose hospitality furniture. Our furniture is mainly from factories in Italy, although countries in Eastern Europe are becoming more important; we try to use UK factories when possible. We are striving to become the best in the industry. We believe that our location is an advantage and we pride ourselves on the service we provide - you will be looked after by a dedicated sales team. We aspire to provide an excellent after-sales service; prompt delivery and efficient installation are a very big part of the business and our installation team are second-to-none. Please explore our website - you will find that you can see pictures of us all on it - or contact us with specific product enquiries.


The best comfort solutions for bedding and seating, made from premium latex and advanced foam products. We strive for innovation, excellent service and sustainability leadership with your comfort in mind. Novaya is a global leader in latex production, leading the way with innovative technologies su

Creative Woodwork is West London’s high-end bespoke fitted furniture and cabinet maker. We specialise in custom built bedrooms, fitted wardrobes, alcove units, floating shelves, media units, home offices and commercial out-fitting. Creative Woodwork’s professional craftsmen and design team creat

Since its foundation in 1953, Tecno has dedicated its activity to re-define the concept of workspaces creating interior architectures, designing and producing innovative furniture focusing on design quality, materials and craftsmanship. Tecno is one of the main protagonists in the birth and expan

PEC italia est une société italienne spécialisée dans la réalisation et l’agencement des points de vente du secteur alimentaire. Le directeur, Paolo Pellegrinetti, grâce à 22 ans d’ expérience, associe à la perfection fonctionnalité, créativité et l’esthétique propres au « made in Italy ». Du re

Ecologic Furniture is a trusted manufacturer of high quality furniture for the residence life market. Ecologic uses environmentally friendly materials and manufacturing processes. For over 30 years, Ecologic Industries has been a pioneer in sustainable business practices, recycling and green manufac

Transforming work experiences through creative design and an unparalleled collection of products, we are a Minority-Owned MillerKnoll Certified Dealer. Since 1984, OfficeWorks has served as your dedicated guide, ensuring people, places, and actions are perfectly aligned to do your best work. We of
.png)
Read more about the M& cyber-attack: M&S Grapples with Cyber Incident Affecting In-Store Services · M&S Chair Details Ransomware Attack,...
Scott T. Lashway is a globally recognized privacy and cybersecurity disputes attorney who servers as Co-chair of Mintz's Privacy...
On September 15, 2025, the Office of the Director of National Intelligence (“ODNI”) issued the first public exclusion and removal order (the...
On September 10, 2025, the U.S. Department of Defense (DoD) published its long-awaited final rule amending the Defense Federal...
This blog post discusses the Department of Defense's (“DoD”) new cybersecurity rule that imposes certain cybersecurity requirements on...
On July 31, 2025, the United States Department of Justice (DOJ) announced a pair of settlements with companies accused of having violated...
On July 14, 2025, the U.S. Department of Justice (DoJ) and General Services Administration (GSA) announced a $14.75 million settlement of...
CA AG fines Healthline $1.55M for CCPA violations, including misuse of health data and inadequate privacy terms.
This is the fourth blog in a series of Covington blogs on cybersecurity policies, executive orders (EOs), and other actions of the new Trump Administration.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Contract Chair Co. is http://www.thecontractchair.co.uk/.
According to Rankiteo, Contract Chair Co.’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Contract Chair Co. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Contract Chair Co. is not certified under SOC 2 Type 1.
According to Rankiteo, Contract Chair Co. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Contract Chair Co. is not listed as GDPR compliant.
According to Rankiteo, Contract Chair Co. does not currently maintain PCI DSS compliance.
According to Rankiteo, Contract Chair Co. is not compliant with HIPAA regulations.
According to Rankiteo,Contract Chair Co. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Contract Chair Co. operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Contract Chair Co. employs approximately 38 people worldwide.
Contract Chair Co. presently has no subsidiaries across any sectors.
Contract Chair Co.’s official LinkedIn profile has approximately 2,340 followers.
No, Contract Chair Co. does not have a profile on Crunchbase.
Yes, Contract Chair Co. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-contract-chair-company.
As of November 28, 2025, Rankiteo reports that Contract Chair Co. has not experienced any cybersecurity incidents.
Contract Chair Co. has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Contract Chair Co. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.