REI Company Cyber Security Posture

rei.com

At Recreational Equipment, Inc. (REI), we exist to inspire and enable life outside for everyone. We believe that itโ€™s in the wild, untamed and natural places that we find our best selves, so our purpose is to awaken a lifelong love of the outdoors, for all. Since 1938, we have been your local outdoor co-op, working to help you experience the transformational power of nature. We bring you top-quality gear and apparel, expert advice, rental equipment, inspiring stories of life outside and outdoor experiences to enjoy alone or share with your friends and family. And because we have no shareholders, with every purchase you make with REI, you are choosing to steward the outdoors, support sustainable business and help the fight for life outside. So whether youโ€™re new to the outdoors or a seasoned pro, we hope youโ€™ll join us.

REI Company Details

Linkedin ID:

rei

Employees number:

9879 employees

Number of followers:

376708.0

NAICS:

452

Industry Type:

Retail

Homepage:

rei.com

IP Addresses:

Scan still pending

Company ID:

REI_2533845

Scan Status:

In-progress

AI scoreREI Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

REI Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

REI Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Recreational Equipment, Inc.Breach5027/2014REI350072825Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The California Office of the Attorney General reported a data breach involving Recreational Equipment Inc. (REI) on July 31, 2014. The breach occurred between July 4 and July 18, 2014, due to unauthorized access by a third party who obtained user credentials from an unrelated site. Approximately 3 accounts were specifically mentioned being affected, and the compromised information included billing and shipping addresses, order history, and dividend amounts.

REI Company Subsidiaries

SubsidiaryImage

At Recreational Equipment, Inc. (REI), we exist to inspire and enable life outside for everyone. We believe that itโ€™s in the wild, untamed and natural places that we find our best selves, so our purpose is to awaken a lifelong love of the outdoors, for all. Since 1938, we have been your local outdoor co-op, working to help you experience the transformational power of nature. We bring you top-quality gear and apparel, expert advice, rental equipment, inspiring stories of life outside and outdoor experiences to enjoy alone or share with your friends and family. And because we have no shareholders, with every purchase you make with REI, you are choosing to steward the outdoors, support sustainable business and help the fight for life outside. So whether youโ€™re new to the outdoors or a seasoned pro, we hope youโ€™ll join us.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=rei' -H 'apikey: YOUR_API_KEY_HERE'
newsone

REI Cyber Security News

2025-06-16T07:00:00.000Z
Consumer Products Cybersecurity: Protecting Data, Building Consumer Confidence

Consumer products companies must boost cybersecurity to protect data, meet regulations, and build consumer trust in an evolving digitalย ...

2025-04-18T07:00:00.000Z
Kiteworks reveals the top data breaches of 2024 report

Kiteworks has revealed its report on the top data breaches of 2024, highlighting the increasing importance of data sensitivity in assessingย ...

2024-07-30T07:00:00.000Z
REI Systems Names Gregory Garrett as COO

Gregory Garrett joins REI Systems as chief operating officer.

2024-08-06T07:00:00.000Z
REI Systems Welcomes Gregory A. Garrett as Chief Operating Officer

REI Systems Welcomes Gregory A. Garrett as Chief Operating Officer. REI Systems provides reliable, effective, and innovative technologyย ...

2023-05-04T01:23:44.000Z
Gregory Garrett

With an illustrious career spanning over 25 years, Gregg Garrett is a seasoned veteran in IT, cybersecurity, and systems engineering. His extensive expertiseย ...

2023-08-04T07:00:00.000Z
Cybersecurity Breakthrough: New Cipher System Protects Computers Against Spy Programs

Modern computer systems are under serious threat from cache side-channel attacks, which can covertly gather sensitive data such as secret keysย ...

2024-10-23T07:00:00.000Z
Building wealth abroad: Why Nigerian investors should consider US real estate with REI capital growth

The Nation Newspaper Building wealth abroad: Why Nigerian investors should consider US real estate with REI capital growth.

2024-10-16T07:00:00.000Z
REI Capital Growth opens U.S. commercial Real Estate to Nigerian investors

In today's global economy, Nigerian investors are seeking new ways to diversify their portfolios and capitalize on wealth-buildingย ...

2024-05-28T07:00:00.000Z
Cybersecurity Engineer: What It Is and How to Become One

The demand for cybersecurity engineers continues to grow in our ever-evolving technological world โ€” discover how you can jump-start thisย ...

similarCompanies

REI Similar Companies

Hallmark Cards

Hallmark believes if you care enough you can change the world as we work to help create a more emotionally connected world in every life, every day. Founded in 1910 by a teenage entrepreneur with two shoe boxes of postcards under his arm, Hallmark today is still family owned and privately held.

SYSTEME U

Bonjour ! Notre vision chez U ? Etre au plus prโˆšยฎs de nos clients et de nos collaborateurs. Pratiquer un commerce qui leur ressemble, un commerce qui nous rassemble, un commerce โˆšโ€  visage humain. Favoriser une consommation raisonnโˆšยฉe et responsable, โˆšยฉtablir de saines relations avec les producteurs

Macy's is Americaโ€™s store for life. The largest retail brand of Macy's, Inc. (NYSE:M) delivers quality fashion at affordable prices to customers at approximately 640 locations in 43 states, the District of Columbia, Puerto Rico, and Guam, as well as to customers in more than 100 international destin

Family Dollar

When it comes to getting value for everyday items for the entire family in an easy to shop, neighborhood location, Family Dollar is the best place to go. One of the nationโ€™s fastest growing retailers, Family Dollar offers a compelling assortment of merchandise for the whole family ranging from house

Founded in 1946, Tupperware's signature container created the modern food storage category that revolutionized the way the world stores, serves and prepares food. Today, we continue to innovate for the benefit of people and our planet by designing innovative, functional and environmentally responsib

Shoppers Stop

Launched in 1991, Shoppers Stop is a pioneer of modern retailing in India. A department store that is continually revolutionising the way modern India shops, today, we have 100+ stores across 40+ cities and a steadily growing online presence at www.shoppersstop.com. We are also the only Indian reta

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

REI CyberSecurity History Information

How many cyber incidents has REI faced?

Total Incidents: According to Rankiteo, REI has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at REI?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: REI Data Breach

Description: The California Office of the Attorney General reported a data breach involving Recreational Equipment Inc. (REI) on July 31, 2014. The breach occurred between July 4 and July 18, 2014, due to unauthorized access by a third party who obtained user credentials from an unrelated site. Approximately 3 accounts were specifically mentioned being affected, and the compromised information included billing and shipping addresses, order history, and dividend amounts.

Date Detected: 2014-07-31

Date Publicly Disclosed: 2014-07-31

Type: Data Breach

Attack Vector: Unauthorized Access

Vulnerability Exploited: User Credentials from an Unrelated Site

Threat Actor: Third Party

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach REI350072825

Data Compromised: billing and shipping addresses, order history, dividend amounts

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are billing and shipping addresses, order history and dividend amounts.

Which entities were affected by each incident?

Incident : Data Breach REI350072825

Entity Type: Retail

Industry: Retail

Customers Affected: 3

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach REI350072825

Type of Data Compromised: billing and shipping addresses, order history, dividend amounts

Number of Records Exposed: 3

References

Where can I find more information about each incident?

Incident : Data Breach REI350072825

Source: California Office of the Attorney General

Date Accessed: 2014-07-31

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-07-31.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Third Party.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2014-07-31.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-07-31.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were billing and shipping addresses, order history and dividend amounts.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were billing and shipping addresses, order history and dividend amounts.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.0.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge