BNMC Blog

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,
” This strange email read.
This didn’t sound like what
the Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep
your business secure,
call BNMC at 978-482-2020,
we’ll help you for sure!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Network Security Productivity Google Malware Hackers Business Microsoft Software Computer Hosted Solutions Tech Term Ransomware Data Internet Communication IT Services Efficiency Mobile Devices Small Business Workplace Tips Backup Cloud Computing Hardware Smartphone Data Recovery IT Support Saving Money Innovation Android Managed IT Services Microsoft Office Business Continuity Windows Users Data Backup Social Media Browser Windows 10 Mobile Device Information Internet of Things Data Management Managed IT Services Word Outsourced IT Gmail App Vulnerability Cybersecurity Passwords Productivity Windows 10 Facebook Upgrade Server Phishing Office 365 Business Management communications Artificial Intelligence Remote Monitoring Network Disaster Recovery Encryption Smartphones Chrome Tip of the week Analytics BYOD Website Applications Money Employer-Employee Relationship IT Support Save Money Managed Service VoIP Virtual Reality Managed Service Provider Gadgets Miscellaneous Infrastructure Apple Government Education YouTube Maintenance Antivirus Risk Management Display Hacker Data storage Office Tips Router Access Control VPN IT Management Employee-Employer Relationship Robot Paperless Office Company Culture Big Data Automation Google Drive Settings Content Filtering Bandwidth Apps Unified Threat Management SaaS desktop Two-factor Authentication Avoiding Downtime Storage Scam Printing Computers HIPAA Virtualization Holiday Firewall Retail Alert Document Management Mobile Security Networking Solid State Drive Wireless Business Intelligence Data Security Spam Computing Monitors Laptop Outlook Vendor Management Chromebook Hard Disk Drive Server Management The Internet of Things Bring Your Own Device Operating System Business Technology WiFi Touchscreen LiFi Virtual Private Network Quick Tips Hosted Solution End of Support Augmented Reality Tablet Administration Downtime Mouse Managing Stress Data loss Development Telephone Systems Alerts USB Content Motherboard Cables Digital Payment Messaging Address Permissions Hacks User Error Google Wallet Writing Identity Continuity Digital Entertainment Patch Management Managed IT Service Halloween Bitcoin Fraud Wi-Fi Cost Management Disaster Digital Signage Smart Office Shortcuts Specifications Business Growth Screen Reader Charging Collaboration Monitoring Solid State Drives Customer Relationship Management Dark Data Licensing Update Dongle Streaming Heating/Cooling Multi-Factor Security Legal Wires Employee-Employer Relationships Password Time Management Printer Unified Communications Drones Solar Spyware iOS Break Fix Scary Stories Windows 8 Assessment Uninterrupted Power Supply Troubleshooting Work Computer Care IBM Security Cameras Search Black Friday Running Cable Smart Tech Politics File Sharing Spying National Security Customer Service Cooperation Service Level Agreement Human Error Servers Google Calendar Deep Learning Voice over Internet Protocol Analysis Students Emergency Buisness Mobile Device Management Network Management Virtual Desktop Office Compliance Samsung Identity Theft Scalability Dark Web Sports Hotspot Internet Exlporer Private Cloud IT Technicians Optimization Training Corporate Profile Managed Services Cyber Monday Alt Codes Connectivity Tech Support Updates Staff Leominster G Suite Device Legislation Modem FinTech Automobile Mixed Reality Dell LED SharePoint Budget Social Engineering Regulations Migration Microsoft Excel Social Language Value Techology Information Technology Mirgation Recycling WannaCry Laptops Managed IT Smart Technology Typing Humor IoT Websites Cabling PowerPoint K-12 Schools Mobility Statistics Cybercrime Best Practice Cookies MSP Google Maps Data Breach How To Lenovo Current Events Computing Infrastructure Professional Services Co-Managed IT Downloads Safety Social Networking Mail Merge Marketing Blockchain VoIP Unified Threat Management Chatbots Remote Computing eWaste Software as a Service Shortcut Distributed Denial of Service Cryptocurrency Star Wars Onboarding IT solutions Going Green Network Congestion Wearable Technology Network upgrade Print Toner Bluetooth Comparison Google Docs Nanotechnology Slack Hard Disk Drives Firefox Superfish Cameras Processors Tracking Machine Learning Meetings Cleaning Unsupported Software CCTV BDR Computer Repair Relocation Webcam Mobile Data Regulation Recovery How To Work/Life Balance Error Ben McDonald shares Printers Health Point of Sale Black Market Travel Law Enforcement Mobile Computing Notifications Supercomputer CrashOverride Electronic Medical Records Twitter Staffing Physical Security Motion Sickness Emoji Taxes Upgrades Gadget Administrator Web Server what was your? Crowdsourcing IT Budget Windows 7 GPS Personal Information Botnet Cortana IT Consultant 3D Printing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3