Contact us today!

Network Solutions Unlimited Blog

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,”
this strange email read.
This didn’t sound like what
The Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep Your business secure, Call Network Solutions Unlimited at 217-428-6449, We’ll help you for sure!

How Can You Find that Lost Smartphone?
Don’t Get Scammed with Gift Cards


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Relocation IT budget HIPAA Project Management IT Support Television Hardware Cache CrashOverride Sales Computer Accessories Specifications Tablets Email Applications Computer Care Business Payroll Identity Theft Training Assessment Laptop Backup and Disaster Recovery iOS Business Owner Security Facebook Licensing Privacy Evernote Maintenance Communication Upgrade Analytics Browser Avoiding Downtime Backup Productivity Printers Internet exploMicrosoft Tip of the Week Users Gifts VPN Business Continuity IT Services Entertainment Thank You SMB Proactive IT Solutions Settings Cortana Best Practice Apps Small Business Charger Excel Hard Drives Conferencing Loyalty Microsoft Cast Ciminal Customer Windows Ink Company Culture App Mobile Security Data Privacy Travel Computing Infrastructure Operating System Hosted Solution Projects Advertising Solid State Drive Internet Exlporer Risk Management Computer Fan Wi-Fi Utility Computing Troubleshooting Mobility Productivity Monitor Windows 10s Efficiency Device Security Microsoft Excel Microsoft Word Video Games Work/Life Balance How To Law Enforcement Two Factor Authentication FAQ Audit Encryption Office Tips Proactive IT Network Security Keyboard Shortcuts Windows 10 Hard Disk Drive Upgrades Information Technology Phone System IT solutions Remote Workers Co-Managed Services Management Paperless Office Techology Recovery Data Storage USB Automobile Safety Edge Remote Monitoring Managed IT Services Bluetooth Security Cameras IT Support Root Cause Analysis The Internet of Things WiFi Virtual Assistant Touchscreen Technology Saving Money Gamification Smartphones App store Windows 10 Virtualization Health Human Resources Payment Cards Mobile Device IT Service Server Peripheral Ransomware Employee-Employer Relationship Streaming Media Update Router History Content Filter IT Management Compliance WannaCry Windows 7 Hyperlink Redundancy Sports Budget Information Money Unsupported Software Computer Electronic Medical Records Mobile Public Computer Disaster Recovery Hacking Quick Tips Access Control Books Chromebook Chromecast Data storage Business Computing Outsourced IT Physical Security Machine Learning Social Engineering User Error Instant Messaging Managed IT Services Worker Comparison VoIP eWaste Cybercrime Sync NFL Virtual Private Network Office Alert Networking Apple SaaS Gmail Amazon Virus Alexa for Business Data Theft Students Flexibility Managed Service Provider Smartphone Cloud Financial User Tips Emails Content Filtering Devices WIndows Server 2008 Samsung Worker Commute Mobile Device Management Google Drive OneNote How to Vendor Management Workers Spam Blocking Webinar Wireless Legislation MSP WPA3 Unified Communications Analysis Keyboard HBO Wireless Charging Vulnerability Remote Computing Twitter Communications Dark Web Phishing Fraud Monitoring Scam Black Market Telephone Systems Value Artificial Intelligence Social Media Content Identity HaaS Hosted Solutions Benefits Employer Employee Relationship Data Loss PDF Google Assistant Firewall Adobe Smart Technology Tech Support Regulation Data Experience Accessory Chrome Save Time Smart Tech IoT Hiring/Firing BDR Transportation Managing Stress Wasting Time Best Practices Telephone Meetings Government Internet of Things Malware Automation Word E-Commerce Google Docs Holiday Innovation Nanotechnology Admin Identities Data Protection Employee Blockchain Politics Cybersecurity Big Data Credit Cards Consultant Business Management Screen Mirroring Battery Reputation Patch Management Google Congratulations Updates Display Managed IT Service Software Audiobook Data Breach Application Business Intelligence Wasting Money Camera Emergency Marketing Shortcut iPhone Save Money Two-factor Authentication Network Antivirus Microsoft Office Printing Augmented Reality Password Computers Virtual Reality Going Green Financial Technology Unified Threat Management Gadgets Files Testing Data Backup Public Cloud intranet Miscellaneous Cloud Computing Internet Data Recovery Storage Document Management Wireless Technology Private Cloud Vendor Cost Management Downtime Employer-Employee Relationship Colocation Outlook Managed IT Robot Android Connectivity Spam Personal Information Lifestyle Computing Spyware Hackers Office 365 Passwords Bring Your Own Device Memory Bandwidth Wireless Internet Mobile Devices Scalability Medical IT Computer Forensics Collaboration Commerce End of Support Windows Monitors Managed Service Touchpad Language File Storage Shadow IT Business Technology Websites Break/Fix Professional Services Software as a Service Rootkit Saving Time Legal Google Maps Data Security Workplace Tips Tech Term File Sharing Humor hacker Cleaning PowerPoint Hybrid Cloud BYOD Data Management Search Administration Retail Hard Drive Education