ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

West Side Graphics is a digital graphics production company located in Newport Beach, California that was founded by William and John Darling in 2014. William Darling owns Newport Frame Company, a custom framing business in Costa Mesa, California. He is also an illustration artist and graphic designer who has been in the business for over 30 years. His youngest son John Darling is a certified digital graphics producer who attended Orange Coast College and is diverse in many creative cloud software programs. They specialize in illustrations, logos and typography, but are not limited to those categories. We can take care of all of your design needs, from billboards to business cards. Our aim is to produce original and quality ideas for clientele in the most prompt and efficient manner for whatever their mind desires. Contact us any time day or night for more information!

West Side Graphics A.I CyberSecurity Scoring

WSG

Company Details

Linkedin ID:

westsidegraphics

Employees number:

3

Number of followers:

13

NAICS:

541

Industry Type:

Graphic Design

Homepage:

westsidegraphicsoc.com

IP Addresses:

0

Company ID:

WES_1803981

Scan Status:

In-progress

AI scoreWSG Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/westsidegraphics.jpeg
WSG Graphic Design
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWSG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/westsidegraphics.jpeg
WSG Graphic Design
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

WSG Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

WSG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for WSG

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for West Side Graphics in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for West Side Graphics in 2025.

Incident Types WSG vs Graphic Design Industry Avg (This Year)

No incidents recorded for West Side Graphics in 2025.

Incident History — WSG (X = Date, Y = Severity)

WSG cyber incidents detection timeline including parent company and subsidiaries

WSG Company Subsidiaries

SubsidiaryImage

West Side Graphics is a digital graphics production company located in Newport Beach, California that was founded by William and John Darling in 2014. William Darling owns Newport Frame Company, a custom framing business in Costa Mesa, California. He is also an illustration artist and graphic designer who has been in the business for over 30 years. His youngest son John Darling is a certified digital graphics producer who attended Orange Coast College and is diverse in many creative cloud software programs. They specialize in illustrations, logos and typography, but are not limited to those categories. We can take care of all of your design needs, from billboards to business cards. Our aim is to produce original and quality ideas for clientele in the most prompt and efficient manner for whatever their mind desires. Contact us any time day or night for more information!

Loading...
similarCompanies

WSG Similar Companies

Fathom is a boutique design firm serving clients in Washington DC, New York, and nationally. By bringing a depth of experience in print design, videography, and web under one roof, we are able to offer multi-tiered responses to design and marketing challenges. Fathom provides full-service creative t

Cimone Key Creative Studio

Embrace the eclectic space of CK Creative Studio located in the heart of Dallas, Texas. A subtle blend of class and chic with international flair establishes this platform from the rivals, as we harness the beauty of the professional promise. Cimone Key Creative Studio, branded as CK Creative Studi

crea dipendenza

Studio crea nasce dalla passione per il mondo della creatività applicata alla grafica pubblicitaria, editoriale e al mondo del web. Curiamo l'immagine on-line e off-line per Istituzioni pubbliche (eventi culturali e mostre temporanee ecc.) e aziende private. Ci poniamo come obbiettivo principale l

Dewyngaert Design

It’s all about psychology. We strive to empathize with how a human interacts with the world. We approach a client’s needs by diving below the surface, analyzing and understanding how their consumers connect with their brand. This ultimately becomes the foundation for solving their needs, while simul

DESIGN 6|3|9

DESIGN 6|3|9 offers graphic design, consulting, print management and decorative painting. With over 25 years of graphic design and printing experience, no project is too large or too small. Providing excellent customer service is a top priority. DESIGN 6|3|9 will take your job from concept to compl

DatAchieve Digital

At DatAchieve Digital we can provide you with the tools to compete in today’s changing digital marketplace and the support, marketing and web management services that keep your message fresh, consistent, and in front of customers. It’s easier than you might think and we’ll even have a little fun alo

newsone

WSG CyberSecurity News

November 24, 2025 11:00 AM
Decatur School Board adopts new cybersecurity framework, technology use policy

DECATUR -- The Decatur School Board voted Tuesday, Nov. 18, to adopt comprehensive new policies aimed at strengthening digital security and...

July 25, 2025 07:00 AM
Tampa, Florida looks to become national cyber hub

The city will host the CyberBay summit later this year, and is looking to use its military background as well as the University of South...

February 14, 2022 08:00 AM
IUPUI gets $3.7M grant to grow its cybersecurity programs

Indiana University-Purdue University at Indianapolis plans to use a $3.7 million grant from the National Science Foundation to grow its...

October 23, 2020 07:00 AM
Cape Coast Technical University gets cyber security unit

The Cape Coast Technical University (CCTU), has set up a $400000 cyber security unit and a forensic laboratory to facilitate the training of...

February 19, 2020 08:00 AM
‘West Side Story’ Stalemate: Bernardo’s Staying. So Are Protesters. (Published 2020)

Demonstrators have been calling for Amar Ramasar's removal from the cast because of his role in a photo-sharing scandal at City Ballet.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

WSG CyberSecurity History Information

Official Website of West Side Graphics

The official website of West Side Graphics is http://www.westsidegraphicsoc.com.

West Side Graphics’s AI-Generated Cybersecurity Score

According to Rankiteo, West Side Graphics’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.

How many security badges does West Side Graphics’ have ?

According to Rankiteo, West Side Graphics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does West Side Graphics have SOC 2 Type 1 certification ?

According to Rankiteo, West Side Graphics is not certified under SOC 2 Type 1.

Does West Side Graphics have SOC 2 Type 2 certification ?

According to Rankiteo, West Side Graphics does not hold a SOC 2 Type 2 certification.

Does West Side Graphics comply with GDPR ?

According to Rankiteo, West Side Graphics is not listed as GDPR compliant.

Does West Side Graphics have PCI DSS certification ?

According to Rankiteo, West Side Graphics does not currently maintain PCI DSS compliance.

Does West Side Graphics comply with HIPAA ?

According to Rankiteo, West Side Graphics is not compliant with HIPAA regulations.

Does West Side Graphics have ISO 27001 certification ?

According to Rankiteo,West Side Graphics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of West Side Graphics

West Side Graphics operates primarily in the Graphic Design industry.

Number of Employees at West Side Graphics

West Side Graphics employs approximately 3 people worldwide.

Subsidiaries Owned by West Side Graphics

West Side Graphics presently has no subsidiaries across any sectors.

West Side Graphics’s LinkedIn Followers

West Side Graphics’s official LinkedIn profile has approximately 13 followers.

West Side Graphics’s Presence on Crunchbase

No, West Side Graphics does not have a profile on Crunchbase.

West Side Graphics’s Presence on LinkedIn

Yes, West Side Graphics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/westsidegraphics.

Cybersecurity Incidents Involving West Side Graphics

As of December 03, 2025, Rankiteo reports that West Side Graphics has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

West Side Graphics has an estimated 2,657 peer or competitor companies worldwide.

West Side Graphics CyberSecurity History Information

How many cyber incidents has West Side Graphics faced ?

Total Incidents: According to Rankiteo, West Side Graphics has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at West Side Graphics ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=westsidegraphics' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge