Posted on Wednesday, August 19, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
There has never been a more crucial time to be cautious while on the Internet. Reports come in every day about the latest victims of phishing emails. It is of upmost importance that you and your business are aware of these scams, as they could end up stealing fortunes from your pockets or sometimes even worse – proprietary, confidential data.
Posted on Tuesday, July 14, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
Data breaches are occurring now more than ever before. 2014 produced an alarming number of privacy and security breaches.
Posted on Wednesday, July 8, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
Data breaches tend to be a result of malicious or criminal intent, human error and system glitches. According to InformationWeek’s 2014 Strategic Survey, “Managing the complexity of security” reclaimed the number one spot among 10 challenges facing the respondents, all from organizations with 100 or more employees. You may now be asking yourself, what can my company do to protect our data? Here are five key steps you can take:
Posted on Tuesday, May 12, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
If you process credit cards, or store and transmit credit card information, you may want to listen up. The latest breed of malware is making its rounds, and it’s particularly worrisome for small and medium businesses that do not have dedicated information security resources.
Posted on Thursday, March 26, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
Penetration testing is a critical component to an organization’s IT risk management program; it is used to identify significant issues that could lead to financial losses, disclosure of confidential data and reputational harm. The infographic below details the overwhelming risks and costs that malicious acts caused in 2014 alone. Skoda Minotti’s Vulnerability Assessment and […]
Posted on Thursday, February 26, 2015 by admin
Skoda Minotti is proud to announce Jaike Hornreich, CISA, GPEN, has passed the Global Information Assurance Certification Web Application Penetration Tester (GWAPT) certification. Hornreich is among an elite class of less than 2,500 people who have been recognized with this certification. GWAPT certification measures an individual’s understanding of web application exploits and penetration testing methodology […]
Posted on Monday, February 9, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
IT security teams at organizations of all shapes and sizes are encountering an alarming increase in the number of attacks and threats impacting their security systems on a daily basis. There doesn’t seem to be a limit to the sophisticated techniques attackers are developing to breach well-known and trusted software and hardware to ultimately gain access to […]
Posted on Monday, January 12, 2015 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
The performance of a vulnerability assessment and/or penetration test is a critical component of any company’s IT risk management program. Understanding the importance and benefits of the tests, the testing process and expectations of the process are key in managing organizational risk and internal control. To help explain these factors, we’ve provided answers to the […]
Posted on Wednesday, December 10, 2014 by Jaike Hornreich, CISA, GPEN, GWAPT, CICP, CCSFP
Learn the impact to your business Earlier this summer, we posted information about a security flaw that threatened millions of websites through two popular content management systems (CMS), WordPress and Drupal. At the time, both WordPress and Drupal released updates to address this concern. Unfortunately, new security threats continue to surface given the recent release […]