Xerox Company Cyber Security Posture

xerox.com

For more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print technology, weโ€™ve expanded into software and services to sustainably power the hybrid workplace of today and tomorrow. Today, Xerox is continuing its legacy of innovation to deliver client-centric and digitally-driven technology solutions and meet the needs of todayโ€™s global, distributed workforce. From the office to industrial environments, our differentiated business and technology offerings and financial services are essential workplace technology solutions that drive success for our clients. At Xerox, we make work, work. Learn more at www.xerox.com and explore our commitment to diversity and inclusion.

Xerox Company Details

Linkedin ID:

xerox

Employees number:

54191 employees

Number of followers:

941235.0

NAICS:

541

Industry Type:

Business Consulting and Services

Homepage:

xerox.com

IP Addresses:

Scan still pending

Company ID:

XER_2339885

Scan Status:

In-progress

AI scoreXerox Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Xerox Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Xerox Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
XeroxBreach50112/2023XER224321124Link
Rankiteo Explanation :
Attack without any consequences

Description: Xerox cybersecurity staff discovered and resolved a security incident that recently affected Xerox Business Solutions, a division of Xerox. The business declared that in addition to taking the required actions to further safeguard the XBS IT environment, they are actively collaborating with outside cybersecurity specialists to carry out a comprehensive investigation into this issue. The event had no influence on XBS operations or on the corporate systems, data, or operations of Xerox. According to the firm, preliminary findings from their inquiry suggest that certain personal data within the XBS environment might have been compromised.

Xerox Company Subsidiaries

SubsidiaryImage

For more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print technology, weโ€™ve expanded into software and services to sustainably power the hybrid workplace of today and tomorrow. Today, Xerox is continuing its legacy of innovation to deliver client-centric and digitally-driven technology solutions and meet the needs of todayโ€™s global, distributed workforce. From the office to industrial environments, our differentiated business and technology offerings and financial services are essential workplace technology solutions that drive success for our clients. At Xerox, we make work, work. Learn more at www.xerox.com and explore our commitment to diversity and inclusion.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=xerox' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Xerox Cyber Security News

2025-07-01T10:30:00.000Z
HCL Technologies and Xerox sign $1.3bn shared services deal to drive operational transformation

HCL Technologies has signed a $1.3bn agreement with Xerox to manage part of its shared services, including administrative and IT functions. Theย ...

2025-05-15T07:00:00.000Z
Xerox Unveils April 2025 Security Patch for FreeFlow Print Server v2

Xerox has released a comprehensive security patch update for its FreeFlow Print Server v2 platform running on Windows 10, addressing a wideย ...

2025-05-15T07:00:00.000Z
Xerox Issues April 2025 Security Patch Update for FreeFlow Print Server v2

Xerox has announced the release of its April 2025 Security Patch Update for the FreeFlowยฎ Print Server v2 running on Windowsยฎ 10,ย ...

2025-02-17T08:00:00.000Z
Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox's Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks toย ...

2024-08-30T07:00:00.000Z
Xerox CISO Dr. Jay On Artificial Intelligence And The Internet of Crimes

Ask The CISO: Q&A with Dr. Jay, Chief Information Security Officer for Xerox and former Deputy CIO for the White House Sponsored by Fortinet. โ€“ย ...

2024-01-03T08:00:00.000Z
Xerox discloses a subsidiaryโ€™s breach following ransomware claim of data theft

Xerox discloses a subsidiary's breach following ransomware claim of data theft. Inc, a relatively new threat group, previously claimed to have stolen companyย ...

2025-02-18T08:00:00.000Z
Xerox printer security risk could let hackers sneak into your systems

Some Xerox printers are vulnerable to a โ€œpass-backโ€ attack which can be used to steal login credentials, experts have warned.

2023-12-30T08:00:00.000Z
Xerox Releases Statement Regarding Cybersecurity Incident Affecting XBS Subsidiary

Xerox's subsidiary, Xerox Business Solutions, experienced a security incident which was detected and contained by Xerox cybersecurity personnel.

2024-08-17T07:00:00.000Z
Rochester Cybersecurity Job Market: Trends and Growth Areas for 2024

Explore the Rochester cybersecurity job market and trends for 2024. Discover growth areas, top employers, and how to start your career inย ...

similarCompanies

Xerox Similar Companies

WNS (Holdings) Limited (NYSE: WNS) is a global digital-led business transformation and services company. WNS combines deep industry knowledge with technology, analytics, and process expertise to co-create innovative, digitally-led transformational solutions with over 600+ clients across various indu

ICF is a global consulting and technology services company with approximately 9,000 employees, but we are not your typical consultants. At ICF, business analysts and policy specialists work together with digital strategists, data scientists and creatives. We combine unmatched industry expertise with

Corporativo Overall

Somos una organizaciโˆšโ‰ฅn con presencia internacional con mโˆšยฐs de 36 aโˆšยฑos de exitosa trayectoria. Contamos con operaciones en Perโˆšโˆซ, Colombia, Chile y Ecuador; asโˆšโ‰  tambiโˆšยฉn brindamos servicios a Centro Amโˆšยฉrica y Espaโˆšยฑa. Brindamos soluciones integrales y a medida para el desarrollo del mercado labo

Jacobs

At Jacobs, we're challenging today to reinvent tomorrow โ€“ delivering outcomes and solutions for the world's most complex challenges. With a team of approximately 45,000, we provide end-to-end services in advanced manufacturing, cities & places, energy, environmental, life sciences, transportation an

Straive

Wisdom, the ability to apply knowledge to the real world with discernment, is critical for todayโ€™s enterprise. However, wisdom becomes available to the enterprise after the iterative application of knowledge to multiple long-tail experiments. Straive helps clients operationalize the Data โ†’Insights

Alorica

Alorica is the global leader in designing and deploying tech-enabled customer experiences (CX) at scale. As a full-service, strategic CX partner, we combine next-gen technology and managed service expertise with a digital-first, human-focused approach. Our 100,000+ experts across 17 countriesโ€” inclu

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Xerox CyberSecurity History Information

How many cyber incidents has Xerox faced?

Total Incidents: According to Rankiteo, Xerox has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Xerox?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does Xerox detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with outside cybersecurity specialists.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Xerox Business Solutions Security Incident

Description: Xerox cybersecurity staff discovered and resolved a security incident that recently affected Xerox Business Solutions, a division of Xerox. The business declared that in addition to taking the required actions to further safeguard the XBS IT environment, they are actively collaborating with outside cybersecurity specialists to carry out a comprehensive investigation into this issue. The event had no influence on XBS operations or on the corporate systems, data, or operations of Xerox. According to the firm, preliminary findings from their inquiry suggest that certain personal data within the XBS environment might have been compromised.

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach XER224321124

Data Compromised: personal data

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are personal data.

Which entities were affected by each incident?

Incident : Data Breach XER224321124

Entity Type: Division

Industry: Technology

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach XER224321124

Third Party Assistance: outside cybersecurity specialists

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through outside cybersecurity specialists.

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach XER224321124

Type of Data Compromised: personal data

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach XER224321124

Investigation Status: ongoing

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as outside cybersecurity specialists.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was personal data.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was outside cybersecurity specialists.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was personal data.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge