Tip of the Month: Use the SLAM Method to Spot Suspicious Emails

At Bluestem, we take cybersecurity very seriously. Each week, employees participate in cybersecurity micro-training sessions so that we can stay up to date on what tactics online bad actors are using, and best practices for protecting our information and yours.

One common way cyber criminals try to gain access to your information is through phishing emails.

Phishing: An attempt to steal or damage sensitive data by deceiving people into revealing personal information like passwords and credit card numbers.

Often phishing attempts will appear to come from a trusted source. Bluestem will never ask you to provide sensitive information over email. However, if you are not sure if an email that you have received is legitimate, you can use the SLAM method to investigate.

S – Sender

Check the email address. It may look like it’s from a legitimate source at first glance, but it will be slightly different from the actual domain. It could also be an unfamiliar domain name or have a misspelling. (ex: @bluestem.com instead of @bluestemfa.com)

L – Links

Do not click on any links in a message that you find suspicious. Instead, you can hover your mouse over the link to see where it leads. If it doesn’t show the website you would expect for that sender, or looks unusual to you in any way, then it probably isn’t legit.

A – Attachments

Opening an attachment on a suspicious email can open you up to dangerous malware or ransomware being installed on your phone or computer. If you are not expecting an attachment, do not open it.

M – Message

A phishing email will likely have clues that it is not what it seems. There may be misspellings or incorrect grammar. If the message has a tone of urgency, asking you to act right now to avoid a consequence, that is a red flag.

Using the SLAM method to evaluate suspicious emails is one way to protect your sensitive information. For other best practices, and steps to take if you are concerned that you’ve had a data breach, check out our Tip of the Month from September 2024.

Sources:

What Is Phishing? | Microsoft Security

The SLAM Method: A Simple Guide to Phishing Prevention