Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,”
this strange email read.
This didn’t sound like what
The Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep Your business secure, Call Network Solutions Unlimited at 217-428-6449, We’ll help you for sure!

How Can You Find that Lost Smartphone?
Don’t Get Scammed with Gift Cards
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

HIPAA Search Telephone Systems Application Retail Webinar Virus Hard Disk Drive Business Owner NFL Advertising Identity Hosted Solution Administration Safety Camera Office Tips Monitor Network Security Managed Service Provider Hacking Professional Services Save Time Memory Assessment Dark Web Books Security Cameras Fraud HaaS Best Practices Cast Internet Exlporer Black Market Google Maps Sales Google Drive Managed IT Services File Storage Credit Cards Emails Chrome Remote Computing Excel Solid State Drive Comparison Cost Management Worker Commute The Internet of Things Charger Gamification Computer Accessories Spyware Legal Windows 10 Productivity Customer Workers Adobe Computer Forensics Applications Business Computing Facebook Windows 10 Windows Antivirus eWaste Project Management Television Router BYOD Training Audit Touchscreen Efficiency Managed IT Services Devices Save Money Maintenance Blockchain Data Recovery Wasting Money Spam Root Cause Analysis Mobile Devices Mobile Security Evernote Data Backup Updates Rootkit Security Cybercrime Saving Money Education Personal Information Access Control Downtime Commerce WannaCry iOS Redundancy Microsoft Word Virtual Assistant Miscellaneous IT budget Automobile SaaS Wireless Charging Shortcut Government Marketing Computing WIndows Server 2008 Business Intelligence Virtual Private Network Business Technology Users Communications Proactive Payroll Amazon Loyalty Storage Keyboard Upgrade Bluetooth Patch Management Data storage WiFi Microsoft Office Display Operating System Printers Saving Time Google Docs Disaster Recovery Innovation Instant Messaging Paperless Office Upgrades Benefits Malware IT Services Streaming Media Vendor Management Politics Augmented Reality Employer-Employee Relationship Big Data Employee-Employer Relationship Networking IT Solutions Technology How to Gifts Management hacker Ransomware How To Recovery Specifications End of Support intranet Content Filter Tech Support Collaboration Emergency Private Cloud Co-Managed Services Encryption Screen Mirroring Information Internet Passwords Connectivity Vendor Word History Backup Admin Mobility Language Information Technology Document Management Wireless Technology Going Green Best Practice Robot Computing Infrastructure Audiobook CrashOverride Email Software as a Service Data Security Health Phone System Employer Employee Relationship Files Sports USB Humor Bandwidth Battery Tablets Remote Monitoring Update Hiring/Firing Wasting Time Alexa for Business Remote Workers Business Continuity MSP Cloud Computing Network User Tips Social Media Human Resources Business Cleaning Outlook Keyboard Shortcuts Privacy Meetings Scalability Unified Communications Android Printing Spam Blocking Money Thank You Apps Workplace Tips Windows 10s Regulation Outsourced IT Identity Theft Managed IT Service Cortana Shadow IT IT solutions App Colocation Hardware Mobile Risk Management Nanotechnology Unsupported Software Social Engineering Troubleshooting Physical Security Firewall Legislation SMB Two Factor Authentication Browser Unified Threat Management Identities Samsung App store Business Management Worker Cloud IoT Analysis Consultant Compliance Virtual Reality Computer Care Conferencing Financial Windows 7 Techology Computers Smart Technology Chromebook Office 365 Office BDR Lifestyle Bring Your Own Device Entertainment Automation IT Support Projects Reputation Settings Students Touchpad Edge iPhone Gmail Hard Drive Vulnerability Content Small Business Proactive IT WPA3 Monitoring Travel Virtualization Hybrid Cloud Scam Sync Managing Stress Smartphones Relocation Device Security Accessory Productivity Gadgets Smart Tech Data Privacy Telephone Websites Phishing Wireless Data Management IT Support File Sharing FAQ Smartphone Communication Wireless Internet Testing Internet of Things Microsoft Peripheral Google Content Filtering Computer Fan Apple User Error Hard Drives Managed Service Hyperlink Managed IT PowerPoint OneNote Financial Technology VPN Microsoft Excel Work/Life Balance Data Theft Public Cloud Mobile Device Management Hackers Congratulations Tech Term Software Internet exploMicrosoft Law Enforcement Artificial Intelligence Holiday Machine Learning Utility Computing Experience Wi-Fi Cybersecurity IT Management Alert Avoiding Downtime PDF Windows Ink Mobile Device Video Games Google Assistant Data Protection Computer Laptop Monitors Electronic Medical Records Tip of the Week Cache Licensing Chromecast Server Twitter Data Loss Flexibility Public Computer Two-factor Authentication Password Data Breach Quick Tips Data IT Service Ciminal Hosted Solutions Transportation Value HBO Company Culture Budget Data Storage VoIP