Skip links

Phishing Phriday #15 | Special Edition | Breaking Down The Slam Method

Read more about our Special Edition Breakdown

Welcome to our guide on assessing a phishing email and protecting yourself online. Today, we delve into the intricacies of identifying suspicious emails through a practical examination. Let’s start by introducing the SLAM method, which stands for Sender, Links, Attachment, and Message. This method is a solid starting point to authenticate the legitimacy of an email.

Starting with the Sender, consider an email that appears to be from a familiar entity but contains oddities, like an unexpected “message delivery” note. A closer inspection, for example in Outlook, can reveal discrepancies in the sender’s details. It’s essential to verify the sender’s information and check for previous communications to establish trustworthiness.

Moving to Links, phishing emails often contain misleading links. For instance, an email mimicking a notification from a well-known company might have a link that changes the cursor to a hand icon over an entire white area, indicating it’s an image turned into a link, rather than text with legitimate links. This discrepancy is a red flag.

Next, we discuss Attachments. In our case, there’s no attachment, eliminating the need to assess the risks associated with downloading or opening files. However, always exercise caution with email attachments, as they can be harmful.

The Message aspect involves scrutinizing the email’s content for spelling errors, grammatical mistakes, or awkward language. These elements often indicate a phishing attempt. Phishing emails may use images instead of text to avoid detection by spam filters, so be wary of messages that don’t follow standard email formatting.

Furthermore, testing the authenticity of links is crucial. For example, a dubious link, when examined in a safe environment, may redirect to a fake website that mimics a legitimate login page, attempting to harvest personal credentials. Legitimate company login pages have specific formats and domains, which can be cross-referenced to verify authenticity.

In conclusion, protecting yourself online requires diligence and awareness. Utilize tools like password managers, which aid in identifying and preventing access to fraudulent websites. By understanding and applying the SLAM method, and ensuring good password hygiene, you can enhance your cybersecurity measures and safeguard your online presence. Stay informed and cautious with email communications, and don’t hesitate to reach out with questions or for further clarification. Stay safe online!

Watch our most recent Phishing Phriday videos here

president tier 818x1024 1

Hi, I'm Jesse and I look forward to speaking with you.

An IT Support partner that you can trust.

I’m proud of the team we’ve assembled and the service they provide to our clients.  It’s because of them that we’re able to make a positive impact in our clients’ businesses and the communities we serve.

Our clients run businesses that depend on technology to operate but don’t have the expertise in-house to manage all the aspects of their Information Technology.  Our unique service delivery model is focused on a business first approach whereby we seek to understand what you’re trying to achieve, and how technology can help you move closer to those goals.  I’d love to connect with you to talk about how we might be able to help you improve the Stability, Security, Strategy, and Supportability of your network.