
Xerox Company Cyber Security Posture
xerox.comFor more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print technology, weโve expanded into software and services to sustainably power the hybrid workplace of today and tomorrow. Today, Xerox is continuing its legacy of innovation to deliver client-centric and digitally-driven technology solutions and meet the needs of todayโs global, distributed workforce. From the office to industrial environments, our differentiated business and technology offerings and financial services are essential workplace technology solutions that drive success for our clients. At Xerox, we make work, work. Learn more at www.xerox.com and explore our commitment to diversity and inclusion.
Xerox Company Details
xerox
54191 employees
941235.0
541
Business Consulting and Services
xerox.com
Scan still pending
XER_2339885
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Xerox Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Xerox Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Xerox | Breach | 50 | 1 | 12/2023 | XER224321124 | Link | |
Rankiteo Explanation : Attack without any consequencesDescription: Xerox cybersecurity staff discovered and resolved a security incident that recently affected Xerox Business Solutions, a division of Xerox. The business declared that in addition to taking the required actions to further safeguard the XBS IT environment, they are actively collaborating with outside cybersecurity specialists to carry out a comprehensive investigation into this issue. The event had no influence on XBS operations or on the corporate systems, data, or operations of Xerox. According to the firm, preliminary findings from their inquiry suggest that certain personal data within the XBS environment might have been compromised. |
Xerox Company Subsidiaries

For more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership position in office and production print technology, weโve expanded into software and services to sustainably power the hybrid workplace of today and tomorrow. Today, Xerox is continuing its legacy of innovation to deliver client-centric and digitally-driven technology solutions and meet the needs of todayโs global, distributed workforce. From the office to industrial environments, our differentiated business and technology offerings and financial services are essential workplace technology solutions that drive success for our clients. At Xerox, we make work, work. Learn more at www.xerox.com and explore our commitment to diversity and inclusion.
Access Data Using Our API

Get company history
.png)
Xerox Cyber Security News
HCL Technologies and Xerox sign $1.3bn shared services deal to drive operational transformation
HCL Technologies has signed a $1.3bn agreement with Xerox to manage part of its shared services, including administrative and IT functions. Theย ...
Xerox Unveils April 2025 Security Patch for FreeFlow Print Server v2
Xerox has released a comprehensive security patch update for its FreeFlow Print Server v2 platform running on Windows 10, addressing a wideย ...
Xerox Issues April 2025 Security Patch Update for FreeFlow Print Server v2
Xerox has announced the release of its April 2025 Security Patch Update for the FreeFlowยฎ Print Server v2 running on Windowsยฎ 10,ย ...
Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB
A critical security vulnerability in Xerox's Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks toย ...
Xerox CISO Dr. Jay On Artificial Intelligence And The Internet of Crimes
Ask The CISO: Q&A with Dr. Jay, Chief Information Security Officer for Xerox and former Deputy CIO for the White House Sponsored by Fortinet. โย ...
Xerox discloses a subsidiaryโs breach following ransomware claim of data theft
Xerox discloses a subsidiary's breach following ransomware claim of data theft. Inc, a relatively new threat group, previously claimed to have stolen companyย ...
Xerox printer security risk could let hackers sneak into your systems
Some Xerox printers are vulnerable to a โpass-backโ attack which can be used to steal login credentials, experts have warned.
Xerox Releases Statement Regarding Cybersecurity Incident Affecting XBS Subsidiary
Xerox's subsidiary, Xerox Business Solutions, experienced a security incident which was detected and contained by Xerox cybersecurity personnel.
Rochester Cybersecurity Job Market: Trends and Growth Areas for 2024
Explore the Rochester cybersecurity job market and trends for 2024. Discover growth areas, top employers, and how to start your career inย ...

Xerox Similar Companies

WNS
WNS (Holdings) Limited (NYSE: WNS) is a global digital-led business transformation and services company. WNS combines deep industry knowledge with technology, analytics, and process expertise to co-create innovative, digitally-led transformational solutions with over 600+ clients across various indu

ICF
ICF is a global consulting and technology services company with approximately 9,000 employees, but we are not your typical consultants. At ICF, business analysts and policy specialists work together with digital strategists, data scientists and creatives. We combine unmatched industry expertise with

Corporativo Overall
Somos una organizaciโโฅn con presencia internacional con mโยฐs de 36 aโยฑos de exitosa trayectoria. Contamos con operaciones en Perโโซ, Colombia, Chile y Ecuador; asโโ tambiโยฉn brindamos servicios a Centro Amโยฉrica y Espaโยฑa. Brindamos soluciones integrales y a medida para el desarrollo del mercado labo

Jacobs
At Jacobs, we're challenging today to reinvent tomorrow โ delivering outcomes and solutions for the world's most complex challenges. With a team of approximately 45,000, we provide end-to-end services in advanced manufacturing, cities & places, energy, environmental, life sciences, transportation an

Straive
Wisdom, the ability to apply knowledge to the real world with discernment, is critical for todayโs enterprise. However, wisdom becomes available to the enterprise after the iterative application of knowledge to multiple long-tail experiments. Straive helps clients operationalize the Data โInsights

Alorica
Alorica is the global leader in designing and deploying tech-enabled customer experiences (CX) at scale. As a full-service, strategic CX partner, we combine next-gen technology and managed service expertise with a digital-first, human-focused approach. Our 100,000+ experts across 17 countriesโ inclu

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Xerox CyberSecurity History Information
How many cyber incidents has Xerox faced?
Total Incidents: According to Rankiteo, Xerox has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Xerox?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does Xerox detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with outside cybersecurity specialists.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Xerox Business Solutions Security Incident
Description: Xerox cybersecurity staff discovered and resolved a security incident that recently affected Xerox Business Solutions, a division of Xerox. The business declared that in addition to taking the required actions to further safeguard the XBS IT environment, they are actively collaborating with outside cybersecurity specialists to carry out a comprehensive investigation into this issue. The event had no influence on XBS operations or on the corporate systems, data, or operations of Xerox. According to the firm, preliminary findings from their inquiry suggest that certain personal data within the XBS environment might have been compromised.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach XER224321124
Data Compromised: personal data
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are personal data.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach XER224321124
Third Party Assistance: outside cybersecurity specialists
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through outside cybersecurity specialists.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach XER224321124
Type of Data Compromised: personal data
Investigation Status
What is the current status of the investigation for each incident?

Incident : Data Breach XER224321124
Investigation Status: ongoing
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as outside cybersecurity specialists.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was personal data.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was outside cybersecurity specialists.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was personal data.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
