Copy
HIPAA compliance, phishing, and a recent Twitter hack. 
View this email in your browser
Facebook
Twitter
Website
Dear clients and subscribers, 

As small business owners ourselves, we know that you have way too much on your plate right now. Many of you have moved your office into your home and we are all working extra hours to figure out how to adapt our business to life in a pandemic.

With these changes to your business structure and how customers interact with your products or services, it's more crucial than ever to have robust cybersecurity and data privacy practices in place. This is why we have recently earned our HIPAA Seal of Compliance, and why it might be a good idea for your business to do the same. 

We will be sharing the details in an upcoming blog post of why we believe this was a necessary step for Pagoda and why it may be necessary for your business as well. Until then, you can just rest easy knowing that when you work with Pagoda, we have the expertise and systems in place to protect sensitive information. 

Keep an eye out for the HIPAA compliance post in our September newsletter, and as always, don't hesitate to reach out with your IT questions or concerns. We're here to help, especially as you navigate running a business in today's rapidly changing world. 

Sincerely, 

Jon Allen & Robbin Finnerty  
Pagoda Technologies Inc Principals

11 Ways to Spot a Phishing Email
 

It only takes one person clicking one malicious link to expose your private company data to a cybercriminal. Employee naivete is the primary vulnerability that cybercriminals target because it’s often the most prevalent and lowest hanging fruit. What’s more, phishing emails that target this vulnerability are only becoming more ubiquitous and tougher to spot. 
 
Improve Your Spam Radar

How to Safeguard Your Twitter Account
 

The mastermind behind Twitter’s largest ever security breach was a 17-year old from Tampa, Florida. Graham Clark gained access to high-profile Twitter accounts, including those of Joe Biden, Barack Obama, and Bill Gates, and used those accounts to scam unsuspecting users out of thousands of dollars.

So how did a high school student get behind the scenes of one of the world’s largest tech giants? He used social engineering and preyed on a Twitter employee's lack of cybersecurity training. Here's how to prevent your account from being hacked:  
 
Secure Your Tweets
Do you know someone who could benefit from these emails? Please forward these free resources their way. Thank you!
Forward Forward

Pagoda Technologies is committed to giving you the best IT experience possible. 

Contact Us for a Free Consultation
Share Share
Tweet Tweet
Forward Forward
+1 +1
Share Share
Copyright © 2020 Pagoda Technologies, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

Email Marketing Powered by Mailchimp