ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

YYES is a boutique design and communications studio. We develop strategic work focused on building our clients' businesses through smart design. We built YYES on the premise that smart design is best accomplished by a small, hard-working group of designers equipped with apt resources and in close collaboration with clients. Co-founded by Ron Fleming and Brent Stickels in 2000 in Los Angeles, we added a Minneapolis office in 2008 to leverage the city’s access to clients on both coasts as well as its design community. Since our founding, we have used a process of discovery, design, and delivery. It establishes a roadmap for our work that ensures well-reasoned, effective, appropriate outcomes that meet business objectives—not just well-decorated artifacts. We have worked in many sectors which include financial services and investing, real estate investing, business-to-business services, health and medicine, academic institutions, entertainment, publishing, hospitality, not-for-profit organizations, and consumer goods.

YYES A.I CyberSecurity Scoring

YYES

Company Details

Linkedin ID:

yyes

Employees number:

31

Number of followers:

420

NAICS:

541

Industry Type:

Graphic Design

Homepage:

yyes.org

IP Addresses:

0

Company ID:

YYE_2980698

Scan Status:

In-progress

AI scoreYYES Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/yyes.jpeg
YYES Graphic Design
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreYYES Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/yyes.jpeg
YYES Graphic Design
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

YYES Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

YYES Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for YYES

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for YYES in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for YYES in 2025.

Incident Types YYES vs Graphic Design Industry Avg (This Year)

No incidents recorded for YYES in 2025.

Incident History — YYES (X = Date, Y = Severity)

YYES cyber incidents detection timeline including parent company and subsidiaries

YYES Company Subsidiaries

SubsidiaryImage

YYES is a boutique design and communications studio. We develop strategic work focused on building our clients' businesses through smart design. We built YYES on the premise that smart design is best accomplished by a small, hard-working group of designers equipped with apt resources and in close collaboration with clients. Co-founded by Ron Fleming and Brent Stickels in 2000 in Los Angeles, we added a Minneapolis office in 2008 to leverage the city’s access to clients on both coasts as well as its design community. Since our founding, we have used a process of discovery, design, and delivery. It establishes a roadmap for our work that ensures well-reasoned, effective, appropriate outcomes that meet business objectives—not just well-decorated artifacts. We have worked in many sectors which include financial services and investing, real estate investing, business-to-business services, health and medicine, academic institutions, entertainment, publishing, hospitality, not-for-profit organizations, and consumer goods.

Loading...
similarCompanies

YYES Similar Companies

Hartless Graphics

Hartless Graphics is a Graphic Design freelance business for Michael Hartless. There are many facets of Graphic Design which Hartless Graphics covers in print design and digital design such as: Book design, Posters, Illustrations, Brochures, Flyers, Business cards, Advertising, Typography, CD de

Becker Design Studio

Becker Studio - Delivering professional designs, animations, websites and presentations to make your company and products memorable. We work with our clients to create effective designs and communication materials for all aspects of their business from corporate identity to education and advertising

Montroy Design

Squarespace website designer dedicated to helping businesses elevate their online presence. With over a decade of experience in the design industry, I specialize in crafting custom designed and functional websites on the Squarespace platform. If you need a professional, modern and easy to use websi

Whistlejacket Studio

We are Whistlejacket. We solve knotty business challenges for clients using creativity and insight. We're a top ten rated agency. We believe in "Purpose'​. We help organisations define, communicate and embody the difference they make in the world. We are passionate about helping you answer one que

AIGA Detroit

The Professional Association for Design AIGA Detroit Overview AIGA Detroit has been a chapter of the national AIGA organization since 1986. The Detroit chapter has 475+ members with a network reaching out to the entire Michigan creative community including: designers, educators, art directors,

Hamilton Creations

Graphic Design is your company's face to the world. It is the heart of effective marketing communication. The best message and writing can be easily lost without a complementary and effective graphic strategy. Whatever you need to communicate to customers, clients, or peers, Hamilton Creations can h

newsone

YYES CyberSecurity News

November 21, 2025 09:33 AM
Europe’s biggest defence tech VC fund closes €150M, eyes cybersecurity and autonomous systems

Keen Venture Partners has announced the first close of its European defence and security technology fund, securing over €150 million,...

July 22, 2025 07:00 AM
Indonesia Eyes Cybersecurity Cooperation with Singapore's Military

The formation of a cyberforce, or the fourth branch in the Indonesian Military has been a topic of discussion in recent months. TNI Commander...

May 28, 2025 07:00 AM
NATO may include cybersecurity in 5% defense spend goal

NATO eyes cybersecurity in new 5% defense spending target ... Image by Shutterstock. NATO is considering counting cybersecurity and related areas...

April 26, 2025 07:00 AM
Ethiopia, Morocco defense cooperation eyes cybersecurity, AI, and defense industries

A four-day official visit to Ethiopia aimed at strengthening military cooperation and expanding collaboration into cybersecurity, artificial intelligence, and...

April 15, 2025 07:00 AM
Bursa Malaysia dips at open, eyes on cybersecurity stocks

As of 9.18am, the FTSE Bursa Malaysia KLCI (FBM KLCI) slipped 0.21 per cent or 3.15 points to 1,483.28 from its previous close of 1,486.43.

March 18, 2025 07:00 AM
Ekuinas eyes cybersecurity market in S-E Asia

Through Bluesify, Ekuinas will be able to capitalise on the fast-growing cybersecurity industry in South-ast Asia, which projected to grow at a...

February 06, 2025 08:00 AM
Five Eyes Agencies Release Guidance on Securing Edge Devices

Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats.

September 27, 2024 07:00 AM
Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

Five Eyes cybersecurity agencies have released joint guidance on identifying Active Directory compromises.

September 20, 2024 07:00 AM
Five Eyes cyber leaders provide threat briefing at major US conference

Cyber security leaders from the Five Eyes intelligence alliance have made a rare joint appearance in public to provide a briefing on the evolving cyber threat...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

YYES CyberSecurity History Information

Official Website of YYES

The official website of YYES is http://www.yyes.org.

YYES’s AI-Generated Cybersecurity Score

According to Rankiteo, YYES’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.

How many security badges does YYES’ have ?

According to Rankiteo, YYES currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does YYES have SOC 2 Type 1 certification ?

According to Rankiteo, YYES is not certified under SOC 2 Type 1.

Does YYES have SOC 2 Type 2 certification ?

According to Rankiteo, YYES does not hold a SOC 2 Type 2 certification.

Does YYES comply with GDPR ?

According to Rankiteo, YYES is not listed as GDPR compliant.

Does YYES have PCI DSS certification ?

According to Rankiteo, YYES does not currently maintain PCI DSS compliance.

Does YYES comply with HIPAA ?

According to Rankiteo, YYES is not compliant with HIPAA regulations.

Does YYES have ISO 27001 certification ?

According to Rankiteo,YYES is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of YYES

YYES operates primarily in the Graphic Design industry.

Number of Employees at YYES

YYES employs approximately 31 people worldwide.

Subsidiaries Owned by YYES

YYES presently has no subsidiaries across any sectors.

YYES’s LinkedIn Followers

YYES’s official LinkedIn profile has approximately 420 followers.

YYES’s Presence on Crunchbase

No, YYES does not have a profile on Crunchbase.

YYES’s Presence on LinkedIn

Yes, YYES maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/yyes.

Cybersecurity Incidents Involving YYES

As of December 03, 2025, Rankiteo reports that YYES has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

YYES has an estimated 2,657 peer or competitor companies worldwide.

YYES CyberSecurity History Information

How many cyber incidents has YYES faced ?

Total Incidents: According to Rankiteo, YYES has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at YYES ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=yyes' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge