croom new

Patriot Tech Services Inc. Blog

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

There’s so many threats,
and with attackers so busy
how can you stop them all
without getting dizzy?

To answer this question,
we look to one Who,
who smartly saved Christmas
from disaster, part two!

We all know this Who,
Cindy Lou, she’s called,
who opened her email
but at that point, she stalled.

She there found a message
from her old friend, the Grinch
but something about it
was off by an inch.

“Hello you my grand chum,”
this strange email read.
This didn’t sound like what
The Grinch would have said!

“I need a big favor,
I feel like a fool,
and right now I’m stuck
in the Jungle of Nool.”

The email went on,
“Just so you’re aware,
I decided to travel
and let down my hair.

“But while I was here,
my wallet was taken!
my tickets were in there,
I’m broke and I’m shaken!

“So please, send me funds
and send them quite fast!
If I don’t get home soon
I don’t know if I’ll last!

“I have included a link
to a transactional site,
please send it in Seusscoin,
I need it tonight!

“So please, my dear Cyndi,
help me come home!
I want to be safe,
nevermore will I roam!”

Cindy sat back,
a frown on her face.
She said, “I don’t think
he’s really stuck in that place.”

Young Cindy was wise,
and, shaking her head,
said, “This might be a scam!
Let me check what I read.

“Aha! Yes, here! This part doesn’t make sense!”
Cindy was heard to exclaim.
“How could the Grinch
misspell my first name?”

She peered ever closer,
and cried out, “Success!
I know the Grinch well,
that’s not his address!”

So Cindy was smart,
and by dialing correctly,
she called up the Grinch
who answered directly:

“Hello, my dear, what do you need?”
Said the reformed Grinch so nicely,
and Cindy explained
what had happened, concisely.

Young Cindy knew that
when one gets a strange note,
one should try to make sure
that note’s a real quote.

Because email can be
a tool for a crook
trying to make you
feel like a schnook.

So be careful of email
now, and all seasons
and when you get a message
always question the reason

For advice to help keep Your business secure, Call Patriot Tech Services Inc. at 877-874-4629, We’ll help you for sure!

How Can You Find that Lost Smartphone?
Don’t Get Scammed with Gift Cards
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Cloud Google Network Security User Tips Hackers Tech Term Computer Business Computing Microsoft Business Management Mobile Devices Malware Hardware Efficiency Software Innovation Smartphone Browser Hosted Solutions Data Backup Windows 10 Email Productivity Workplace Tips Data Apps Windows Windows 10 Business Internet of Things Upgrade Smartphones Android Data Security Cybersecurity Data Recovery Backup VoIP IT Services communications Mobile Device Management Miscellaneous Business Continuity Best Practice Passwords Productivity Small Business Operating System Outsourced IT Cybercrime IT Support Office 365 Spam Holiday Gmail Server Network Two-factor Authentication Networking Managed Service Provider Saving Money Employer-Employee Relationship Artificial Intelligence Automation Money Google Drive Data Management Disaster Recovery Chrome Budget Users Office Applications Phishing Remote Computing User Error Information Microsoft Office Bandwidth Update Alert Vulnerability Cost Management Law Enforcement Tech Support Blockchain Ransomware Government Communication Virtualization Collaboration Information Technology Wireless Charging Encryption DDoS Access Control Travel Mobile Device Social Media Sports Proactive IT Quick Tips Cortana Risk Management Hacking Data Breach Politics Managed Service Health Gadgets Managed IT Services Router Evernote eWaste Project Management Wireless Technology Human Resources Facebook Marketing Devices Bring Your Own Device Wi-Fi The Internet of Things Business Technology OneNote Google Docs Saving Time Computers Word Social Engineering Safety Apple iPhone Password Mobile Security Managed IT Services Streaming Media Google Assistant Recovery Telephone Systems VPN Application Fraud Retail Going Green Social Office Tips App Internet Exlporer Value Google Maps Data storage Identities Software as a Service IT solutions Data Privacy Audit Humor Wearable Technology Telephone Administrator Edge Virtual Assistant Storage Hosted Solution Conferencing Projects Maintenance Memory Avoiding Downtime Data Theft Vendor Augmented Reality Distributed Denial of Service Admin Language Touchscreen Gifts Hard Drive Tablets IT Support BDR Running Cable Hyperlink Access Ciminal Alexa for Business WiFi Antivirus Customer Service Teamwork Device Security Financial Remote Monitoring Trending History Legislation Computing Mobile Computing Bluetooth Employee-Employer Relationship Telephony Computer Forensics Data Loss Keyboard Shortcuts Data Protection Credit Cards Chromebook WannaCry NFL Vendor Management Wasting Time Transportation Meetings Windows 7 Files Shortcut Private Cloud Comparison App store Mobility Biometrics Fax Server Uninterrupted Power Supply Workers Management Television Payroll Laptop Virus Benefits FAQ Printing Bloatware Accessory Robot IT budget SaaS Excel PDF PowerPoint Legal Scam Display Save Money Spyware Hybrid Cloud Managed IT Specifications Hacker Testing Updates Wireless Internet Microsoft Excel Customer Relationship Management Security Cameras Touchpad Proactive Emergency Branding Charger Windows Ink Lithium-ion battery Firewall Peripheral Co-Managed Services Chromecast Cloud Computing Amazon Commerce Search Sales Identity Camera Disaster Microsoft Word Gamification Reputation Identity Theft Machine Learning Operating Sysytem File Sharing Websites Patch Management Cleaning Root Cause Analysis Unified Threat Management Company Culture Consultant intranet Congratulations Virtual Reality Scalability Music Big Data Analytics Wireless Hiring/Firing SharePoint Cache Tablet Worker Commute WIndows 7 Solid State Drive Outlook Business Intelligence Worker Twitter Administration Instant Messaging IT consulting HBO Computer Fan How To Data Storage End of Support Books Smart Technology Printers Network Congestion Cameras Work/Life Balance Managing Stress Hard Disk Drive Sync Science CrashOverride Regulations USB Emails Current Events Automobile Screen Mirroring Advertising Electronic Medical Records User Video Games Computer Care Relocation Printer Save Time Battery Webinar IT Management Monitors Samsung Compliance Cast Unsupported Software Printer Server Entertainment Phone System Adobe HaaS Near Field Communication Computer Accessories Point of Sale IT solutions WIndows Server 2008 Nanotechnology Black Market Training Upgrades Regulation BYOD Thank You Text Messaging Presentation Licensing Best Available Flexibility Employer Employee Relationship Education Experience iOS Hard Drives Personal Information Keyboard Settings Mouse Windows 10s

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Passwords are always a major pain point for businesses, but in some industries, their importance is emphasized more than others. In particular, government-based organizations need to be prepared to keep more secure passwords. While we understand that not all organizations ar...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login