
SLAM that Phishing Email
You may know the SLAM technique as STOP LOOK ASSESS MANAGE. This is a good technique to use when you are faced with an unexpected email. We have another SLAM to help you identify phishing.
Posts about:
You may know the SLAM technique as STOP LOOK ASSESS MANAGE. This is a good technique to use when you are faced with an unexpected email. We have another SLAM to help you identify phishing.
No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an email sent by a cyber-criminal. Some spam is obvious (can you say, “Viagra at a discount”?) but others are VERY cleverly designed to sneak past all the filters and trick the recipient into opening the door. Known as a “phishing” email, this still is the #1 way hackers get around firewalls, filters, and antivirus. It is critical that you and your employees know how to spot a threatening email. Here are four types of emails you should never open.