Our Blog: Stuff we think you should know

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,
” This strange email read.
This didn’t sound like what
the Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep
your business secure,
call Haber Group at 866.625.3560,
we’ll help you for sure!

Tip of the Week: Check Out These 4 Android Shortcu...
Securing Your Google Account: The Unofficial Guide


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Hosted Solutions Network Security Productivity Google Internet Software Tech Term Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Business Continuity Cloud Computing Data Management Data Recovery Managed IT Services Browser Office 365 Gmail Data Backup Internet of Things Facebook Server Windows Users Upgrade Managed IT Services Innovation Word Passwords Disaster Recovery Smartphones App Phishing Outsourced IT Social Media Windows 10 communications Vulnerability Business Management Cybersecurity Managed Service Provider VoIP Artificial Intelligence Remote Monitoring Encryption Network Chrome Mobile Device Employer-Employee Relationship Managed Service Big Data Tip of the week Apple Miscellaneous Information Government Analytics IT Support Applications BYOD Spam Money Website Infrastructure Office Tips Hacker Content Filtering Save Money Firewall YouTube Tablet Education Access Control WiFi Antivirus Data storage Risk Management Router Display Avoiding Downtime Wireless The Internet of Things Virtualization Robot Printing Customer Service Automation Virtual Reality IT Management Settings Two-factor Authentication Paperless Office Maintenance Bandwidth Employee-Employer Relationship Scam LiFi Computers Storage Search Unified Threat Management HIPAA Holiday Solid State Drive Networking Retail IBM Presentation Development Administration Chromebook Office Mobile Device Management Hard Disk Drive VPN Data Security Gadgets Customer Relationship Management Outlook Wireless Technology Monitors Recovery Mobile Security Wi-Fi Data loss Business Technology Laptop Document Management Virtual Private Network Augmented Reality Server Management Operating System End of Support Touchscreen Safety Computing Business Intelligence Password Telephone Systems Google Drive Apps Downtime Hosted Solution Mouse Vendor Management SaaS Quick Tips Hacking Company Culture Students Writing Computing Infrastructure Dongle Bluetooth Recycling Human Error Google Docs Competition Smart Technology Motherboard MSP Scalability Windows 8 Knowledge Permissions Assessment Remote Computing Legislation Sports Identity Corporate Profile Managing Stress Managed Services Business Growth FCC Smart Tech Update VoIP PowerPoint Google Wallet Mobile Office How To Current Events Alerts Service Level Agreement eWaste Device Distributed Denial of Service Migration Experience Fraud Unified Communications Internet Exlporer IT service Heating/Cooling LED Legal Undo Comparison Digital Payment WannaCry Cables Laptops Alt Codes Dark Data Title II Connectivity Time Management Onboarding Drones Marketing SharePoint Running Cable Politics Virtual Desktop Modem Collaboration Firefox Slack Going Green Social Engineering Application Licensing Cabling Continuity Mobility Managed IT Service Charging Social Value BDR Servers Smart Office Co-Managed IT Specifications Buisness Compliance Wires Software as a Service Typing Online IT solutions IoT Network Management Digital Signage Lithium-ion battery Downloads IT Technicians Tech Support Break Fix Cookies File Sharing Techology Monitoring Cooperation Computer Care Managed IT Solar Print Toner Deep Learning Humor Lenovo Messaging Hacks Hotspot Professional Services Samsung Google Maps Work Content 5G Black Friday Regulations Digital Voice over Internet Protocol Entertainment Cryptocurrency Cortana Microsoft Excel Star Wars Desktop Budget Hard Drives Multi-Factor Security Halloween Mirgation Websites Identity Theft Mail Merge sip Fun Dark Web Nanotechnology Unified Threat Management Spying How To Staff Training Disaster Shortcut Shortcuts Bring Your Own Device Spyware Superfish Analysis Employee-Employer Relationships Language USB G Suite Statistics Optimization Streaming Cyber Monday Social Networking Automobile FinTech iOS Bitcoin Network Congestion User Blockchain Cost Management Troubleshooting Refrigeration Google Calendar Scary Stories Chatbots Address Security Cameras Best Practice telephony Public Speaking Net Neutrality Screen Reader User Error Information Technology IP Address Printer Cybercrime Wearable Technology Uninterrupted Power Supply Patch Management Administrator CrashOverride Mobile Computing Crowdsourcing Taxes Personal Information Web Server Printers Physical Security Machine Learning IT Budget Upgrades GPS Computer Repair IT Consultant Processors Cameras Relocation Emergency Meetings 3D Printing Tracking Health Cleaning Windows 7 Alert CCTV Private Cloud Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Regulation Error Black Market Point of Sale Mobile Data Domains Travel Law Enforcement Notifications Twitter Botnet Supercomputer Motion Sickness Gadget Staffing