BNMC Blog

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,
” This strange email read.
This didn’t sound like what
the Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep
your business secure,
call BNMC at 978-482-2020,
we’ll help you for sure!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Hackers Google Productivity Network Security User Tips Software Tech Term Business Microsoft Computer Internet Communication IT Services Hosted Solutions Efficiency Mobile Devices Ransomware Smartphone Small Business Data IT Support Android Innovation Hardware Cloud Computing Data Recovery Managed IT Services Backup Saving Money Business Continuity Windows 10 Windows Data Backup Data Management Internet of Things Workplace Tips Microsoft Office Managed IT Services Browser Outsourced IT Passwords Productivity Vulnerability Server Cybersecurity Users App Business Management Windows 10 Disaster Recovery Encryption Word Smartphones Upgrade Chrome Remote Monitoring Facebook Phishing Mobile Device communications Office 365 Artificial Intelligence Gmail Managed Service Tip of the week Information VoIP Employer-Employee Relationship Managed Service Provider Analytics Applications BYOD Social Media Infrastructure Network Website Money IT Support Maintenance Antivirus Save Money Robot Big Data Google Drive Content Filtering Bandwidth Automation Settings Miscellaneous Virtual Reality Apple Access Control IT Management Paperless Office Government Router YouTube Risk Management Hacker Data storage Company Culture Office Tips Employee-Employer Relationship Display Outlook Spam Computing Managing Stress Operating System Laptop Firewall WiFi Two-factor Authentication LiFi Vendor Management The Internet of Things Avoiding Downtime Monitors Development Document Management Scam Chromebook Hosted Solution Administration Downtime Mouse Wireless Networking End of Support HIPAA Gadgets VPN Mobile Security Education Storage Data Security Server Management Business Technology SaaS Printing Business Intelligence Virtual Private Network Touchscreen Holiday Quick Tips Computers Tablet Data loss Unified Threat Management Telephone Systems Retail Alert desktop Device Bluetooth Comparison Cookies MSP Virtual Desktop Digital Alt Codes Firefox Superfish Customer Service Augmented Reality K-12 Schools Sports Disaster Office Samsung Social Networking Bring Your Own Device Migration Address Permissions Computing Infrastructure Professional Services Collaboration LED eWaste Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots Information Technology Mobility Specifications Nanotechnology Spyware Typing Humor Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Social Engineering Motherboard Cables Computer Care IBM Best Practice Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Identity Continuity Solid State Drive Software as a Service Break Fix Websites Fraud Cost Management Cybercrime Onboarding Time Management Printer Apps Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Marketing Smart Office Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Servers Solar G Suite Hard Disk Drive Entertainment Dark Web Assessment Automobile Hacks Digital Signage Network Management Remote Computing Google Wallet Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Network Congestion Work Dell Legislation Voice over Internet Protocol WannaCry Business Growth Cooperation Service Level Agreement Halloween Cabling Streaming Compliance Legal iOS Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Writing Unified Communications Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Spying Techology Virtualization IT Technicians Optimization Statistics Modem FinTech Analysis How To Lenovo Dark Data Update Staff Leominster Scary Stories Human Error Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Running Cable Mobile Device Management Downloads Buisness Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment VoIP Unified Threat Management Mirgation Recycling How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Private Cloud Mobile Computing CCTV Black Market Law Enforcement Webcam Notifications Windows 7 Electronic Medical Records Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares Crowdsourcing BDR Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors what was your? Unsupported Software IT Budget Web Server GPS IT Consultant Computer Repair Relocation Printers Cameras Mobile Data

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3