Our Blog: Stuff we think you should know

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,
” This strange email read.
This didn’t sound like what
the Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep
your business secure,
call Haber Group at 866.625.3560,
we’ll help you for sure!

Tip of the Week: Check Out These 4 Android Shortcu...
Securing Your Google Account: The Unofficial Guide
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Hackers Privacy Email Business Malware User Tips Computer Business Computing Internet Network Security Software Google Productivity Tech Term Microsoft Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Ransomware Backup Windows 10 Hardware Data Android Smartphone IT Support Productivity Saving Money Workplace Tips Managed IT Services Data Management Browser Microsoft Office Managed IT Services Facebook Business Continuity Server Cloud Computing Upgrade Internet of Things Data Recovery Windows Gmail Passwords Innovation Office 365 Disaster Recovery Phishing Data Backup Word App Remote Monitoring Business Management Outsourced IT Windows 10 Mobile Device Users Smartphones Managed Service Provider Cybersecurity VoIP Artificial Intelligence Employer-Employee Relationship Encryption Information Network Infrastructure Chrome Content Filtering Government Big Data Miscellaneous Spam communications BYOD Website Tip of the week Analytics Vulnerability Social Media IT Support Applications Office Tips Money Printing Automation WiFi Hacker Settings Two-factor Authentication Avoiding Downtime The Internet of Things Bandwidth IT Management YouTube Maintenance Save Money Apple Risk Management Tablet Wireless Data storage Antivirus Display Access Control Router Virtual Reality Employee-Employer Relationship Managed Service Firewall Paperless Office Customer Service Robot Safety Mobile Security Virtual Private Network Operating System Development Presentation Holiday Server Management Downtime End of Support Unified Threat Management Hosted Solution Computing Office Touchscreen Google Drive Wireless Technology Password Gadgets Vendor Management Virtualization Telephone Systems Recovery Mouse LiFi Search Education Quick Tips Document Management Computers Scam IBM Business Intelligence Storage Administration Retail Mobile Device Management Apps HIPAA Networking Customer Relationship Management Company Culture Wi-Fi Laptop Outlook VPN Hacking Augmented Reality Monitors Data Security SaaS Data loss Business Technology Halloween Deep Learning Humor Value Cortana Specifications Compliance eWaste Device Network Management Online IoT Managed IT Fun Hacks Remote Computing Downloads IT Technicians LED Techology Break Fix Cookies Cables Undo Laptops Google Maps Cryptocurrency Update Cooperation Onboarding Digital Lenovo Budget Scary Stories Bring Your Own Device sip Hotspot Professional Services Slack Mail Merge How To Black Friday Marketing Regulations Continuity Mobility Digital Payment Microsoft Excel Star Wars Charging Disaster Shortcut Multi-Factor Security Mirgation Smart Office Application Co-Managed IT Unified Threat Management IP Address Cybercrime Politics Dark Web Nanotechnology Wires Software as a Service Statistics Bitcoin Network Congestion Chromebook Staff Digital Signage Spyware Superfish Sports Best Practice telephony Collaboration Language USB Monitoring Address Knowledge Information Technology Cyber Monday Social Networking Solar Print Toner Google Docs Blockchain Cost Management Uninterrupted Power Supply Patch Management Writing Google Calendar Chatbots Work Content User Error Mobile Office Tech Support Net Neutrality Screen Reader Voice over Internet Protocol Bluetooth Windows 8 Printer Wearable Technology Desktop Motherboard Hard Drives Shortcuts Business Growth File Sharing Computing Infrastructure Dongle Spying Corporate Profile Experience Unified Communications Google Wallet Computer Care Smart Technology Permissions Assessment Analysis Solid State Drive Current Events Samsung Legislation Identity Optimization Streaming VoIP Running Cable Legal Websites Identity Theft FCC Smart Tech FinTech Virtual Desktop Troubleshooting How To Distributed Denial of Service Refrigeration Security Cameras IT service Heating/Cooling Buisness Alt Codes Dark Data Alerts User Service Level Agreement WannaCry Drones Training Automobile Fraud Internet Exlporer Public Speaking Hard Disk Drive IT solutions Going Green Social Engineering G Suite Comparison Recycling Human Error Time Management Lithium-ion battery Title II Connectivity MSP Competition Cabling Social SharePoint Firefox Managed IT Service Modem Managing Stress Managed Services BDR Servers 5G Typing Licensing PowerPoint Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server GPS Mobile Data Computer Repair IT Consultant Relocation Processors Cameras Tracking Meetings Health Cleaning Private Cloud Regulation Mobile Computing Alert CCTV Physical Security Entertainment Emoji Webcam CrashOverride Electronic Medical Records Upgrades Work/Life Balance Error Domains Black Market Point of Sale Travel Emergency 3D Printing Law Enforcement Notifications Botnet Supercomputer Twitter Printers Motion Sickness Unsupported Software Gadget Staffing