Category Archives: Risk Advisory Services

5 Tips for Protecting Your New Computer

Posted on Monday, August 24, 2015 by

The new school year is coming, which can often mean new computers for you and your children. This can be an exciting time, but it can also go very bad if you don’t take the right precautionary steps up front.

Also posted in Mailchimp RSS | | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

Phishing Emails Strike Again!

Posted on Wednesday, August 19, 2015 by

There has never been a more crucial time to be cautious while on the Internet. Reports come in every day about the latest victims of phishing emails. It is of upmost importance that you and your business are aware of these scams, as they could end up stealing fortunes from your pockets or sometimes even worse – proprietary, confidential data.

Also posted in Mailchimp RSS | | Tagged , , , , , , , , , , , , , , , | Leave a comment

3 Tips for Preventing Social Engineering Attacks

Posted on Wednesday, August 5, 2015 by

Many people today fall victim to social engineering attacks without even knowing. While the term does not always have a negative connotation, in IT circles, social engineering refers to the psychological manipulation of people with the intent of getting them to reveal personal information or to take certain actions. According to, social engineering is used in over 66% of all attacks by hackers. Phishing is one of the most prevalent forms of social engineering.

Also posted in Mailchimp RSS | | Tagged , , , , , , | Leave a comment

Data Breaches: Is Your Business at Risk? [Infographic]

Posted on Tuesday, July 14, 2015 by

Data breaches are occurring now more than ever before. 2014 produced an alarming number of privacy and security breaches.

Also posted in Mailchimp RSS | | Tagged , , , , , , , | Leave a comment

A Million Dollar Bill with your Dollar Cup of Coffee

Posted on Wednesday, July 8, 2015 by

Data breaches tend to be a result of malicious or criminal intent, human error and system glitches. According to InformationWeek’s 2014 Strategic Survey, “Managing the complexity of security” reclaimed the number one spot among 10 challenges facing the respondents, all from organizations with 100 or more employees. You may now be asking yourself, what can my company do to protect our data? Here are five key steps you can take:

Also posted in Mailchimp RSS | | Tagged , , , , , , | Leave a comment

What’s in a Swipe: Are You Protected Against Point-of-Sale Malware?

Posted on Tuesday, May 12, 2015 by

If you process credit cards, or store and transmit credit card information, you may want to listen up. The latest breed of malware is making its rounds, and it’s particularly worrisome for small and medium businesses that do not have dedicated information security resources.

Also posted in Mailchimp RSS | | Tagged , , , , , , , | Leave a comment

Infographic: The Facts about Data Breaches

Posted on Thursday, March 26, 2015 by

Penetration testing is a critical component to an organization’s IT risk management program; it is used to identify significant issues that could lead to financial losses, disclosure of confidential data and reputational harm. The infographic below details the overwhelming risks and costs that malicious acts caused in 2014 alone.     Skoda Minotti’s Vulnerability Assessment and […]

Also posted in Mailchimp RSS | | Tagged , , , , , , | Leave a comment

Jaike Hornreich Earns GWAPT Certification

Posted on Thursday, February 26, 2015 by

Skoda Minotti is proud to announce Jaike Hornreich, CISA, GPEN, has passed the Global Information Assurance Certification Web Application Penetration Tester (GWAPT) certification. Hornreich is among an elite class of less than 2,500 people who have been recognized with this certification. GWAPT certification measures an individual’s understanding of web application exploits and penetration testing methodology […]

| Tagged , , , , , , , | Leave a comment

Think your IT Environment is Secure? Think again.

Posted on Monday, February 9, 2015 by

IT security teams at organizations of all shapes and sizes are encountering an alarming increase in the number of attacks and threats impacting their security systems on a daily basis. There doesn’t seem to be a limit to the sophisticated techniques attackers are developing to breach well-known and trusted software and hardware to ultimately gain access to […]

Also posted in Mailchimp RSS | | Tagged , , , , , , | Leave a comment

Vulnerability Assessment and Penetration Testing FAQs

Posted on Monday, January 12, 2015 by

Understanding the importance and benefits of security tests, the testing process and expectations of the process are key in managing organizational risk and internal control. To help explain these factors, we’ve provided answers to the most commonly asked questions we receive from potential clients.

Also posted in Mailchimp RSS | | Tagged , , , , , , , | Leave a comment

© Copyright 2018 Skoda Minotti | Privacy Policy | Disclaimer | Remote Support
Cleveland 440-449-6800 | Akron 330-668-1100 | Tampa 813-288-8826
Website designed and developed by Skoda Minotti Strategic Marketing