ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At Wesco, we believe life should run smoothly. As a leading provider of business-to-business distribution, logistics services and supply chain solutions, we create a world that you can depend on. Harnessing 100 years of ingenuity and expertise, we increase profitability, improve productivity and mitigate risk for approximately 150,000 customers worldwide. With millions of products and locations in more than 50 countries, Wesco is your partner in progress. Our company’s greatest asset is our people. From our corporate and field offices to our distribution sites, Wesco employs over 20,000 professionals around the globe. We’re committed to fostering diversity and inclusion across our workforce by embracing the unique perspectives, authenticity, and individuality our team members contribute to the company. Headquartered in Pittsburgh, Wesco is a publicly traded (NYSE: WCC) FORTUNE 500® company with 2023 net sales of $22.4 billion.

Wesco A.I CyberSecurity Scoring

Wesco

Company Details

Linkedin ID:

wesco.corp

Employees number:

11,268

Number of followers:

189,876

NAICS:

42

Industry Type:

Wholesale

Homepage:

wesco.com

IP Addresses:

0

Company ID:

WES_7707859

Scan Status:

In-progress

AI scoreWesco Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/wesco.corp.jpeg
Wesco Wholesale
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWesco Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/wesco.corp.jpeg
Wesco Wholesale
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Wesco Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Wesco Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Wesco

Incidents vs Wholesale Industry Average (This Year)

No incidents recorded for Wesco in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Wesco in 2025.

Incident Types Wesco vs Wholesale Industry Avg (This Year)

No incidents recorded for Wesco in 2025.

Incident History — Wesco (X = Date, Y = Severity)

Wesco cyber incidents detection timeline including parent company and subsidiaries

Wesco Company Subsidiaries

SubsidiaryImage

At Wesco, we believe life should run smoothly. As a leading provider of business-to-business distribution, logistics services and supply chain solutions, we create a world that you can depend on. Harnessing 100 years of ingenuity and expertise, we increase profitability, improve productivity and mitigate risk for approximately 150,000 customers worldwide. With millions of products and locations in more than 50 countries, Wesco is your partner in progress. Our company’s greatest asset is our people. From our corporate and field offices to our distribution sites, Wesco employs over 20,000 professionals around the globe. We’re committed to fostering diversity and inclusion across our workforce by embracing the unique perspectives, authenticity, and individuality our team members contribute to the company. Headquartered in Pittsburgh, Wesco is a publicly traded (NYSE: WCC) FORTUNE 500® company with 2023 net sales of $22.4 billion.

Loading...
similarCompanies

Wesco Similar Companies

Atacadão

O Atacadão é uma empresa do Grupo Carrefour Brasil, com mais de 370 unidades de autosserviço e 36 atacados de entrega e centros de distribuição, que garantem o abastecimento de comerciantes, transformadores e consumidores finais, e está em contínua expansão. Com base nos pilares estratégicos de com

Sonepar

Sonepar is an independent family-owned company standing as the world leader in B-to-B distribution of electrical equipment, solutions, and services. In 2023, Sonepar achieved sales of €33.3 billion. Present in 40 countries with a dense network of brands, the Group is leading an ambitious transform

Truper

Somos la empresa más reconocida en Latinoamérica en manufactura, distribución y comercialización de herramientas y productos para todos los segmentos de la industria ferretera. Nuestro catálogo está en constante crecimiento, incluye más de 15,000 productos. El buen desempeño de estos está garantiz

Ferguson

Since 1953, Ferguson has been a leading source of quality supplies for a variety of industries. We are proud to provide world-class products and services to a customer base that is as vast and varied as our inventory. The professionals we serve help transform the world we live in, and we are their t

Ferguson

The United States segment operates primarily under the Ferguson brand and provides expertise, solutions, and products, from infrastructure, plumbing and appliances to HVAC, fire, fabrication and more, to residential and non-residential contractors. Our products are delivered through a common network

Razgulay Group

Core busines of the Group ($1 mlrd revenue, 15'000 hc); - agricultural production on 500 000 hectars; - 12 regional trading companies; - import of the sugar raw materials and cereals; - processing and storage capacity: * storage 17 silos 2 000 000 MT * sugar 11 plants

Fastenal

By providing three things – truly local service, the world’s largest vending program, and unmatched inventory management – Fastenal saves your business time and money. Who are Fastenal's customers? • Organizations wanting to strengthen their supply chains. • Businesses looking to streamline their

Rexel

Rexel, worldwide expert in the multichannel professional distribution of products and services for the energy world, addresses three main markets: residential, commercial, and industrial. The Group supports its residential, commercial, and industrial customers by providing a tailored and scalable ra

Porsche Holding

Porsche Holding Salzburg is the largest and most successful automotive distributor in Europe. Our roots are in Salzburg, but we now also operate in 29 countries on three continents. Our core expertise: global automotive distribution. Our business divisions: automotive wholesale, automotive retail, f

newsone

Wesco CyberSecurity News

November 10, 2025 04:02 PM
How IEC 61162 standards are building smarter fleets - November 2025 - RJ Connect

The maritime industry is moving through one of the most important transformations in its history. Ships that once operated as collections of independent...

November 10, 2025 03:40 PM
End-to-end security across IT and OT environments

Siemens is collaborating with Accenture to offer 24/7 managed IT/OT security operations centre (SOC) services, providing end-to-end security across IT and...

September 13, 2025 07:00 AM
Wesco Transforms Cybersecurity with AI and Integrated Tools

By centralizing data lakes and employing natural language processing for threat intelligence, the firm has reduced alert fatigue by up to 70%,...

August 07, 2025 06:13 PM
Why South Africa is a prime target for ransomware attacks

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa.

June 12, 2025 07:00 AM
CSO Awards 2025 showcase world-class security strategies

Winners will be recognized at the annual CSO Conference + Awards taking place October 20-22, 2025..

June 03, 2025 10:32 AM
AI and cyber security: South Africa’s next battleground

Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise,...

February 14, 2025 08:00 AM
WESCO INTERNATIONAL INC SEC 10-K Report

WESCO International Inc., a leading provider of electrical, industrial, and communications MRO and OEM products, construction materials,...

November 13, 2024 12:55 PM
Sustainable last-mile delivery electric trucks - November 2024 - Siemens South Africa

Workhorse Group launched its lineup of medium-duty electric work trucks with the help of Teamcenter X software for cloud-based Product Lifecycle Management (...

November 12, 2024 12:35 PM
Higher level cybersecurity certification for Schneider Electric

Schneider Electric's EcoStruxure IT Network Management Card 3 (NMC3) platform has obtained a new and higher level of cybersecurity certification.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Wesco CyberSecurity History Information

Official Website of Wesco

The official website of Wesco is http://www.wesco.com.

Wesco’s AI-Generated Cybersecurity Score

According to Rankiteo, Wesco’s AI-generated cybersecurity score is 773, reflecting their Fair security posture.

How many security badges does Wesco’ have ?

According to Rankiteo, Wesco currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Wesco have SOC 2 Type 1 certification ?

According to Rankiteo, Wesco is not certified under SOC 2 Type 1.

Does Wesco have SOC 2 Type 2 certification ?

According to Rankiteo, Wesco does not hold a SOC 2 Type 2 certification.

Does Wesco comply with GDPR ?

According to Rankiteo, Wesco is not listed as GDPR compliant.

Does Wesco have PCI DSS certification ?

According to Rankiteo, Wesco does not currently maintain PCI DSS compliance.

Does Wesco comply with HIPAA ?

According to Rankiteo, Wesco is not compliant with HIPAA regulations.

Does Wesco have ISO 27001 certification ?

According to Rankiteo,Wesco is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Wesco

Wesco operates primarily in the Wholesale industry.

Number of Employees at Wesco

Wesco employs approximately 11,268 people worldwide.

Subsidiaries Owned by Wesco

Wesco presently has no subsidiaries across any sectors.

Wesco’s LinkedIn Followers

Wesco’s official LinkedIn profile has approximately 189,876 followers.

NAICS Classification of Wesco

Wesco is classified under the NAICS code 42, which corresponds to Wholesale Trade.

Wesco’s Presence on Crunchbase

No, Wesco does not have a profile on Crunchbase.

Wesco’s Presence on LinkedIn

Yes, Wesco maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wesco.corp.

Cybersecurity Incidents Involving Wesco

As of November 28, 2025, Rankiteo reports that Wesco has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Wesco has an estimated 6,307 peer or competitor companies worldwide.

Wesco CyberSecurity History Information

How many cyber incidents has Wesco faced ?

Total Incidents: According to Rankiteo, Wesco has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Wesco ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=wesco.corp' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge