Tip of the Week: Worried About Phishing? Use the SLAM Method

So, what is the SLAM method?

The SLAM Method is a Simple Practice to Help Spot Phishing

The SLAM method is a framework to help keep phishing prevention practices in mind.

  • Sender: Who supposedly sent the message? Check the email address to make sure the address matches the supposed sender, with no misspellings or suspicious URLs.
  • Links: Before clicking on any links, make sure you hover over them so the actual URL displays. Make sure it matches where the link should direct to.
  • Attachments: Are there any attachments included with the message, especially those that you wouldn?t expect to be included? These attachments are often used to ferry threats in, making their presence suspicious.
  • Message: What does the message itself say? Misspelled words and poor grammar, along with content that is uncharacteristic of the supposed sender, can all be indicative of phishing.

Keep the SLAM Method in Mind for More Effective Phishing Prevention

We really can?t overstate how important it is that you keep phishing from having an impact on your business, as it can lead to several other security issues. White Mountain IT Services is here to help you do so, as well as attend to various other cybersecurity needs. Give us a call at (603) 889-0800 to learn more.

Related Posts

Strategies to Control Your Passwords

Passwords are the keys to digital access, but they're often not treated as keys; meaning they aren’t always protected by their users. Unfortunately, people don’t always do everything they can to protect their passwords and there are a lot more scammers out there than pickpockets. Effective password management is crucial for any business. It works to maintain the security of online accounts and se...

Tip of the Week: Three Steps to Policing Your IT Policies

Small businesses are presented with the challenging prospect of monitoring and policing various IT-related policies that you might have for your network infrastructure and workplace technology use. The difficulty of this notion does little to lessen its importance, however. You need to take action to protect your assets, data, and reputation from the countless threats out there, and ensuring that ...

Tip of the Week: Putting Google Alerts to Work for You

First, what are Google Alerts? Google Alerts is a Tool Offered By Google to Deliver Content to You Basically, you can sign up to receive an email if a topic you?ve specified is searched for and new content comes up as a result, specifying how often you want to receive this report. What You Can Be Alerted To: If you?re not sure what you might want these insights into, here are some examples of ...

You Need to Have a Business Continuity Plan for Your SMB

Business technology is known to be remarkably finicky, particularly if you do not have the requisite knowledge to manage and maintain it. After all, there is a reason why you hire an IT department or a managed service provider to handle this role. What happens if your technology fails, though? Do you have a plan in place? What does a plan like this even look like, anyway? Let’s dig into the detail...