SLAM Method: Protecting Your Business from Phishing Attacks

Jeff Sterling

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more can be launched via a phishing email.

Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve their methods as technology progresses. They use AI-based tactics to make targeted phishing more efficient, for example.

If phishing didn’t continue working, then scammers would move on to another type of attack. But that hasn’t been the case. People continue to get tricked. They open malicious file attachments, click on dangerous links, and reveal passwords.

Studies also show that as soon as 6 months after training, phishing detection skills wane. Employees begin forgetting what they’ve learned, and cybersecurity suffers as a result.
Give your employees/coworkers an easy to remember method for suspicious of phishing identification – SLAM!

Phishing: A cyber-attack tricking individuals into revealing sensitive information such as passwords, client data, financial data, or for the unsuspecting user to download an attachment or visit a link to infect their computer, usually via email.

Types of Phishing: Includes social engineering methods like smishing (texts) and vishing (calls).

SLAM Acronym:

  • Sender: Verify the sender’s email address.
  • Links: Check where links lead.
  • Attachments: Be cautious with file attachments.
  • Message: Assess if the email makes sense.

Best Practices:

  • Teach the SLAM method or implement Security Awareness Training (SAT).
  • Use business-grade endpoint & anti-virus protection.
  • Scan files sources, services and malware to secure document sharing.
  • Implement Zero Trust Cyber Security.

Understanding and using SLAM can help prevent phishing, a leading cause of data breaches. Both awareness training and security software can improve your defenses against phishing attacks. Contact us today to discuss your email security needs.

Thank you

Dear Valued Clients,

As this year is wrapping up, we always like to reflect on everything we have accomplished and how we would not be successful without every one of you. On behalf of everyone at M Cubed Technologies, we want to express our deepest gratitude for your partnership. We realize how lucky we are to have all of you entrust us with your IT needs. That partnership is not taken lightly, and we are honored to be a part of your success story.

We appreciate your willingness to work with us and our staff. We realize that this isn’t a one-way road, but a collaborative effort. Your feedback and communication are very important to us, and it allows us to deliver the best quality service to you and your employees. As the new year is quickly approaching, we look forward to working with you in supporting your goals and building on the strong foundation we have established.

Thank you so much for your loyalty and support!

M Cubed Family

Dangers of Browser Extensions

Joe Ryan

Browser extensions can be incredibly useful, but they also pose significant risks if not carefully managed. Malicious extensions can lead to security breaches, performance issues, and even legal problems. These extensions often request extensive permissions, potentially allowing them to harvest your data without your knowledge or consent. Installing an unknown extension can be a gateway for malware or spyware, secretly accessing sensitive information like passwords, browser history, and banking details. In addition to security risks, malicious extensions can also slow down your device. If web pages load more slowly than usual or if your device experiences random slowdowns, it might be infected with a harmful extension. The unauthorized collection of sensitive data could lead to data mishandling, which may result in legal complications or violations. Even seemingly legitimate extensions should be approached with caution. Always research an extension before downloading it to ensure it’s trustworthy.

How to Protect Yourself

To minimize the risks posed by browser extensions:

  • Review permissions before installing an extension
  • Download only from trusted sources (like official browser stores).
  • Regularly review and update your extensions, removing any that are unnecessary or unknown.
  • Manage extensions via your browser’s extension settings (usually accessed by clicking the triple-dot menu or puzzle piece icon in the browser toolbar).

By staying vigilant, you can protect your device and personal data from potential threats.