BNMC Blog

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,
” This strange email read.
This didn’t sound like what
the Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep
your business secure,
call BNMC at 978-482-2020,
we’ll help you for sure!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Business Computing Network Security Hackers Business Tech Term User Tips Google Software Computer Internet Microsoft Productivity IT Services Efficiency Mobile Devices Hosted Solutions Ransomware Communication Hardware Smartphone Data Small Business IT Support Android Managed IT Services Backup Saving Money Data Recovery Business Continuity Cloud Computing Data Management Windows 10 Windows Internet of Things Browser Managed IT Services Innovation App Cybersecurity Productivity Microsoft Office Business Management Data Backup Workplace Tips Upgrade Disaster Recovery Office 365 Encryption Mobile Device Windows 10 Passwords Gmail Artificial Intelligence Facebook Server Phishing Remote Monitoring Word Outsourced IT Website Employer-Employee Relationship Analytics communications Smartphones BYOD Tip of the week Chrome Network Managed Service Provider Infrastructure IT Support Money Applications Vulnerability IT Management Company Culture Risk Management Social Media Automation Google Drive Bandwidth Content Filtering Miscellaneous Office Tips Government Paperless Office Big Data VoIP Managed Service Data storage Settings Antivirus Information Router Users YouTube Save Money Maintenance Robot Access Control Data Security Administration Document Management Business Technology Server Management End of Support Mouse Touchscreen Virtual Reality Virtual Private Network Wireless Quick Tips Managing Stress Education Tablet Laptop Apple Storage Development The Internet of Things SaaS Employee-Employer Relationship Printing Holiday Downtime Two-factor Authentication HIPAA Hacker Alert Avoiding Downtime Scam Unified Threat Management Mobile Security Data loss Display Telephone Systems Outlook desktop Spam Computing Networking Business Intelligence WiFi Vendor Management Monitors Operating System Firewall LiFi Hosted Solution VPN Monitoring Regulations Uninterrupted Power Supply Current Events Websites Shortcuts Language Value Cyber Monday Scary Stories Spyware Best Practice Recycling File Sharing Streaming IoT Legislation Running Cable Computer Care IBM Mirgation Safety Cryptocurrency Troubleshooting Cookies SharePoint MSP Solid State Drive Apps Augmented Reality K-12 Schools Microsoft Excel Buisness Spying Social Networking Techology Virtual Desktop IT solutions Going Green Security Cameras Computing Infrastructure Managed IT Professional Services Smart Technology Sports Identity Theft Remote Computing Google Docs How To Chatbots Lenovo eWaste Hacks Human Error Statistics Star Wars Training Corporate Profile Network Congestion Analysis Automobile Bitcoin Nanotechnology Downloads Hard Disk Drive Google Wallet Wearable Technology Mail Merge Network upgrade Blockchain VoIP Motherboard Unified Threat Management Cables Dell Wi-Fi Managed Services Alerts Shortcut USB Distributed Denial of Service Writing Business Growth Firefox Identity Superfish Continuity Cabling Password Device Fraud Bluetooth Cost Management Comparison WannaCry Computers Legal Google Maps Windows 8 LED Screen Reader Charging Cybercrime Dark Data Unified Communications Update Drones Address Smart Office Permissions Retail PowerPoint User Error Wires Licensing Patch Management Dongle Managed IT Service Marketing Customer Relationship Management Solar Mobile Device Management Politics Mobility Assessment Specifications Gadgets Deep Learning Co-Managed IT Heating/Cooling Smart Tech Multi-Factor Security Customer Service Work Office Alt Codes Samsung Onboarding Time Management Printer Voice over Internet Protocol Cooperation Service Level Agreement Break Fix Digital Payment Compliance Disaster Tech Support Print Toner Hotspot Search Internet Exlporer Black Friday Halloween Digital Bring Your Own Device Slack Collaboration Social Content Servers Connectivity Google Calendar Chromebook Budget IT Technicians Emergency Optimization Social Engineering Typing Humor Digital Signage Network Management Modem FinTech Information Technology Staff Leominster Dark Web Webcam Physical Security Twitter Upgrades Gadget Emoji Crowdsourcing Error Point of Sale Ben McDonald shares Personal Information Botnet Travel 3D Printing Cortana Printers G Suite Processors Machine Learning Supercomputer CrashOverride Motion Sickness Unsupported Software Staffing Virtualization Administrator Taxes BDR Web Server what was your? Computer Repair Relocation IT Budget Mobile Data GPS How To Work/Life Balance Regulation IT Consultant Recovery Cameras Health Private Cloud Meetings Mobile Computing Tracking Black Market Law Enforcement Cleaning Notifications CCTV Electronic Medical Records

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3