Company Details
thompson-contract
2
185
337
thompsoncontract.com
0
THO_6233982
In-progress

Thompson Contract Company CyberSecurity Posture
thompsoncontract.comFounded on the basis of making European designs more accessible to the U.S. market, Thompson Contract partners with some of Europe’s premier contract seating and table manufacturers. Product diversity is one of Thompson Contract’s many strengths. Our portfolios include both tables and chairs for virtually every application, including corporate, hospitality, healthcare, scholastic, transportation, outdoor applications and more.
Company Details
thompson-contract
2
185
337
thompsoncontract.com
0
THO_6233982
In-progress
Between 750 and 799

Thompson Contract Global Score (TPRM)XXXX



No incidents recorded for Thompson Contract in 2025.
No incidents recorded for Thompson Contract in 2025.
No incidents recorded for Thompson Contract in 2025.
Thompson Contract cyber incidents detection timeline including parent company and subsidiaries

Founded on the basis of making European designs more accessible to the U.S. market, Thompson Contract partners with some of Europe’s premier contract seating and table manufacturers. Product diversity is one of Thompson Contract’s many strengths. Our portfolios include both tables and chairs for virtually every application, including corporate, hospitality, healthcare, scholastic, transportation, outdoor applications and more.


Specializing in SOLUTIONS™ In today's competitive business environment, organizations are seeking an edge -- a way to maximize productivity and creativity en route to bolstering the bottom line. That's where USBI can help. We provide integrated interior solutions -- furnishings, services and

Meadows Office Interiors – a market-leading contract furniture dealer – creates innovative workspaces that are strategically designed to help customers improve business performance, increase collaboration, realize cost efficiencies and build brand recognition. Aligned with hundreds of manufacturer

Founded in 1998, EZ Living Furniture is a family run, Irish owned and operated retailer. We have 17 stores currently operating nationwide and plans for more. We have over 300 fantastic employees. EZ Living Furniture has become the number one selling furniture brand in Ireland and we are dedicated t

The destination for home furnishings in Arkansas, Oklahoma and Tennessee. Luxury style at affordable prices. With our affinity program, HOWSE | GUEST, members receive exclusive discounts and benefits such as free IN | HOWSE design services, free shipping for online orders, and so much more. Join to

Since 1998 Vine & Branches Fine Woodworks’ manufacturing home in the Dallas / Fort Worth Metroplex has been producing custom cabinetry and millwork that is among the finest money can buy. Our dedication to the craft is clearly reflected in the quality of our work. As we continue our tradition of exc

MDF Italia is a Milan-based design company. Founded by Bruno Fattorini in 1992 and now run by the Cassina family, we create and produce designer items and furnishings characterised by design challenge and essentiality of form. MDF Italia products live in the most diverse contexts, thanks to a univ
.png)
Information relating to Australian military programs has been compromised in cyber attacks on defence industry contractors,...
Sarah Thompson, head of cyber, North America, for MSIG USA, discusses the evolution of cyber insurance, managing third-party risks and more.
The Department of Defense (DoD) has introduced the Cybersecurity Risk Management Construct (CSRMC), a new framework that replaces the legacy...
Executive Summary The Department of Defense (DoD), also referred to as the Department of War (DoW), has announced the Cybersecurity Risk...
Ashley Thompson, AHA senior vice president of public policy analysis and development, participated in a panel discussion during Modern...
By: Angela B. Styles, Michael J. Vernick, Evan D. Wolff, Rita S. Heimes, Maida Oringher Lerner, Marta A. Thompson, David A. Mahoney,...
Cybersecurity Marketing Veteran Tony Thompson joins Seemplicity to accelerate go-to-market for AI-powered remediation and vulnerability...
PRNewswire-PRWeb/ -- Today at Black Hat 2025, cybersecurity and compliance leaders Christopher Strand and Jason Thompson officially launched...
With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Thompson Contract is http://ThompsonContract.com.
According to Rankiteo, Thompson Contract’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Thompson Contract currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Thompson Contract is not certified under SOC 2 Type 1.
According to Rankiteo, Thompson Contract does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Thompson Contract is not listed as GDPR compliant.
According to Rankiteo, Thompson Contract does not currently maintain PCI DSS compliance.
According to Rankiteo, Thompson Contract is not compliant with HIPAA regulations.
According to Rankiteo,Thompson Contract is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Thompson Contract operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Thompson Contract employs approximately 2 people worldwide.
Thompson Contract presently has no subsidiaries across any sectors.
Thompson Contract’s official LinkedIn profile has approximately 185 followers.
Thompson Contract is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Thompson Contract does not have a profile on Crunchbase.
Yes, Thompson Contract maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/thompson-contract.
As of November 28, 2025, Rankiteo reports that Thompson Contract has not experienced any cybersecurity incidents.
Thompson Contract has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Thompson Contract has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.