ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Welcome to Your Conveyancer, Scotland's only provider of volume conveyancing services dedicated solely to the financial services and property sectors. Residential conveyancing and specifically purchase, sale and remortgage is our core business. Our clients include many of the UK's leading mortgage lenders, estate agents, mortgage brokers, IFAs and builders. We are recognised as market leaders both in our use of technology and the manner in which we deliver our services and this enables us to tailor our systems and processes to match those of our clients and to become a virtual conveyancing department within their own organisations. We are committed to continually setting new standards of excellence in client care and to making the process of buying, selling and remortgaging as fast, efficient and stress free as possible. We are registered under three International Standards, ISO9001 for Quality Management, ISO20000 for IT Service Desk Management and ISO27001 for Information Security Management as well as being accredited under Lexcel and Investors in People . We believe that we are the only legal practice in Scotland to have achieved all of these exacting quality standards and by adopting the recommended frameworks in these standards, we have changed the way that we work and demonstrated our commitment to delivering a high quality, secure and customer focused service to our clients. We are solicitors and are regulated by the Law Society of Scotland

Your Conveyancer Limited A.I CyberSecurity Scoring

CL

Company Details

Linkedin ID:

your-conveyancer-limited

Employees number:

79

Number of followers:

550

NAICS:

5411

Industry Type:

Legal Services

Homepage:

yourconveyancer.co.uk

IP Addresses:

0

Company ID:

YOU_4836844

Scan Status:

In-progress

AI scoreCL Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/your-conveyancer-limited.jpeg
CL Legal Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCL Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/your-conveyancer-limited.jpeg
CL Legal Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CL Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

CL Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CL

Incidents vs Legal Services Industry Average (This Year)

No incidents recorded for Your Conveyancer Limited in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Your Conveyancer Limited in 2025.

Incident Types CL vs Legal Services Industry Avg (This Year)

No incidents recorded for Your Conveyancer Limited in 2025.

Incident History — CL (X = Date, Y = Severity)

CL cyber incidents detection timeline including parent company and subsidiaries

CL Company Subsidiaries

SubsidiaryImage

Welcome to Your Conveyancer, Scotland's only provider of volume conveyancing services dedicated solely to the financial services and property sectors. Residential conveyancing and specifically purchase, sale and remortgage is our core business. Our clients include many of the UK's leading mortgage lenders, estate agents, mortgage brokers, IFAs and builders. We are recognised as market leaders both in our use of technology and the manner in which we deliver our services and this enables us to tailor our systems and processes to match those of our clients and to become a virtual conveyancing department within their own organisations. We are committed to continually setting new standards of excellence in client care and to making the process of buying, selling and remortgaging as fast, efficient and stress free as possible. We are registered under three International Standards, ISO9001 for Quality Management, ISO20000 for IT Service Desk Management and ISO27001 for Information Security Management as well as being accredited under Lexcel and Investors in People . We believe that we are the only legal practice in Scotland to have achieved all of these exacting quality standards and by adopting the recommended frameworks in these standards, we have changed the way that we work and demonstrated our commitment to delivering a high quality, secure and customer focused service to our clients. We are solicitors and are regulated by the Law Society of Scotland

Loading...
similarCompanies

CL Similar Companies

Higgins & Associates Court Reporting, Videography & Videoconference Center

Higgins & Associates is proud to announce that we are celebrating 30 years of excellence! We have serviced law firms nationally and are located in Columbus, Ohio. Our litigation support services include court reporting, Legal Videography, and a Videoconferencing Center. We are conveniently locat

Warners Solicitors

Warners is a leading law firm in the South East committed to providing quality advice to its clients. Warners offers a wide range of legal services to individuals, businesses, and organisations of all sizes. Warners is known for its innovative legal approach and its dedication to client care. Warner

Robert J. Renna P.C.

The Law Office of Robert J. Renna, P.C., established in 2002, focuses on delivering personalized, exemplary representation to our clients to achieve maximum monetary compensation. This law office has been privileged and honored to represent thousands of individuals of Brooklyn, New York, Queens, Bro

CaseSight, Inc.

CaseSight creates compelling presentations that help patent litigators achieve favorable outcomes. Our disciplined, proven process enables work to be leanly staffed yet scalable to any case size or requirement. We understand the time and financial constraints that exist in today’s marketplace and

Stark & Stark

Since 1933, Stark & Stark has developed innovative legal solutions to meet our clients’ needs. More than 100 attorneys, over 30 practice areas, and a philosophy of putting the law to work for our clients is the basis from which we build and maintain our practice. Our Client Relationships At Stark &

Gryll Law

Over 50 years of experience - Gryll Law is Chuck and Brian Gryll: a father-and-son team with over 50 years of combined experience as real estate, business and estate planning attorneys. We offer personalized, client-focused service to the Chicago area. Small firm big results - At a large firm,

newsone

CL CyberSecurity News

October 02, 2025 07:00 AM
Half of buyers still shrug off cyber security risks, even as scammers target property deposits

Half of Australians say they have little to no concern about sharing personal details when buying a property, even as cyber criminals...

August 09, 2024 06:22 AM
ENS not liable for intercepted payment in property transfer, rules Supreme Court

The Supreme Court of Appeal overturned an earlier ruling of the Gauteng Local Division, which found law firm Edward Nathan Sonnenberg Incorporated (ENS) liable.

August 05, 2024 07:00 AM
Melbourne family loses more than $500,000 while buying home as scammers hack conveyancer’s email

Hackers and cyber criminals are using emails sent from conveyancers email inboxes to trick Melbourne families into giving up six figure sums...

May 04, 2023 07:00 AM
Cyber-attack cost conveyancing giant £7m - but the insurers paid up

Goodwill writedown contributes to huge operating loss at Simplify, which was forced to cut new instructions for 10 weeks.

March 20, 2023 09:34 AM
Cyber threats are now a key risk for property practices

Professional obligations have always evolved to meet clients' changing needs. For property professionals including lawyers, conveyancers and real estate...

December 23, 2020 08:00 AM
The Block mysterious buyer who failed to pay up denies FORGING bank documents

Self-described cyber security consultant Ms Fajk insists she paid a $425,600 deposit to the Nine Network's trust account on December 17,...

September 16, 2019 07:00 AM
PEXA Key stops cybercriminals in their tracks

Property Exchange Australia (PEXA) is tackling cyber-crime head-on with the launch of its new app – PEXA Key – which provides a safe channel...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CL CyberSecurity History Information

Official Website of Your Conveyancer Limited

The official website of Your Conveyancer Limited is http://www.yourconveyancer.co.uk.

Your Conveyancer Limited’s AI-Generated Cybersecurity Score

According to Rankiteo, Your Conveyancer Limited’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Your Conveyancer Limited’ have ?

According to Rankiteo, Your Conveyancer Limited currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Your Conveyancer Limited have SOC 2 Type 1 certification ?

According to Rankiteo, Your Conveyancer Limited is not certified under SOC 2 Type 1.

Does Your Conveyancer Limited have SOC 2 Type 2 certification ?

According to Rankiteo, Your Conveyancer Limited does not hold a SOC 2 Type 2 certification.

Does Your Conveyancer Limited comply with GDPR ?

According to Rankiteo, Your Conveyancer Limited is not listed as GDPR compliant.

Does Your Conveyancer Limited have PCI DSS certification ?

According to Rankiteo, Your Conveyancer Limited does not currently maintain PCI DSS compliance.

Does Your Conveyancer Limited comply with HIPAA ?

According to Rankiteo, Your Conveyancer Limited is not compliant with HIPAA regulations.

Does Your Conveyancer Limited have ISO 27001 certification ?

According to Rankiteo,Your Conveyancer Limited is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Your Conveyancer Limited

Your Conveyancer Limited operates primarily in the Legal Services industry.

Number of Employees at Your Conveyancer Limited

Your Conveyancer Limited employs approximately 79 people worldwide.

Subsidiaries Owned by Your Conveyancer Limited

Your Conveyancer Limited presently has no subsidiaries across any sectors.

Your Conveyancer Limited’s LinkedIn Followers

Your Conveyancer Limited’s official LinkedIn profile has approximately 550 followers.

NAICS Classification of Your Conveyancer Limited

Your Conveyancer Limited is classified under the NAICS code 5411, which corresponds to Legal Services.

Your Conveyancer Limited’s Presence on Crunchbase

No, Your Conveyancer Limited does not have a profile on Crunchbase.

Your Conveyancer Limited’s Presence on LinkedIn

Yes, Your Conveyancer Limited maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/your-conveyancer-limited.

Cybersecurity Incidents Involving Your Conveyancer Limited

As of November 30, 2025, Rankiteo reports that Your Conveyancer Limited has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Your Conveyancer Limited has an estimated 7,389 peer or competitor companies worldwide.

Your Conveyancer Limited CyberSecurity History Information

How many cyber incidents has Your Conveyancer Limited faced ?

Total Incidents: According to Rankiteo, Your Conveyancer Limited has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Your Conveyancer Limited ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=your-conveyancer-limited' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge