How can the SLAM method help you avoid phishing?
The SLAM method is an important part of cybersecurity education. Knowing it may help you avoid scammers and cybercriminals trying to steal your data and money. Learn what the SLAM method is and how it will help you recognize and defend against phishing.
Table of Contents
Table of Contents
What is the SLAM method?
The SLAM method is a technique that helps internet users identify and shut down email phishing attacks. Keep in mind that the same SLAM acronym is also used to abbreviate the simultaneous localization and mapping technique that’s often used in robotics. Don’t get confused if you go to learn more about phishing and end up learning about robots making maps for themselves.
What does “SLAM” stand for?
Let’s analyze how the SLAM method helps you avoid phishing emails:
S — sender
The S in SLAM stands for “sender.” It’s there to remind you that the first thing you should do when you get an email is verify the sender and their full email address. Scammers often spoof email addresses to make them look legitimate. Always check it carefully and keep little details in mind. For example, if a person usually writes to you from their outlook.com email and now suddenly sends an email from a hotmail.com client — be very suspicious.
L — links
The L in SLAM stands for “links.” Links in phishing emails lead to websites designed to steal personal information, install malware, or trick you out of your money. Hover your cursor over anchor texts to see their actual destination before clicking on them. It’s always best to open a new tab and go straight to a website you need instead of clicking a link. If you encounter a shortened URL, be very suspicious and do not click on it — check it with a link checker tool.
A — attachments
The A in SLAM stands for “attachments.” Phishing emails often have malicious files attached. They could install spyware, a trojan, or ransomware on your device. Be very suspicious of email attachments that come from unknown or unexpected people. If you’re the least bit suspicious, try contacting the sender through a different channel and ask them about it.
M — messages
The M in SLAM stands for “messages.” The content of the email message itself can give you the clues you need to spot phishing. Look for grammatical errors, urgent language, or unexpected requests for sensitive information, which are common in phishing emails. Serious organizations will never ask you for personal information or login details via email. If the message seems suspicious, it’s best to err on the side of caution and not respond.
The SLAM method: What should you do if you get a phishing email?
Recognizing a phishing attempt is only the first step in protecting yourself and your organization from potential harm. Once you detect a phishing email, you have to handle it accordingly:
- Don’t interact with the email. Don’t click on the links, download the files, or respond to the message. Responding will confirm to the attacker that your email address is active, which could lead to more phishing attempts.
- Report the phishing attempt. Forward the email to your organization’s IT department or upload it to phishing reporting websites like phishing.org or apwg.org.
- Mark the email as phishing. Use your email client’s built-in features to flag the email as spam or phishing. This helps improve spam filters and prevent future attacks for you and other users.
- Delete the email. Once reported and marked, delete the phishing email from your inbox and trash folder to ensure it’s gone for good.
- Monitor your accounts. If you interacted with the email before realizing it is a phishing attempt, immediately check your accounts for any unauthorized activity. Change your most sensitive passwords as a precaution.
- Run a security scan on your device. Use up-to-date antivirus or anti-malware software to scan your device for any potential threats.
Does the SLAM method help prevent a breach?
Yes, the SLAM method helps prevent a data breach. By focusing on key aspects of phishing emails — sender, links, attachments, and message — the SLAM method allows users to identify phishing attempts before any damage is done.
Another way to avoid phishing and, in turn, data breaches is to use phishing protection software like NordVPN’s Threat Protection Pro™. It uses massive databases and machine learning to identify phishing websites and scans your downloading files for malware. This way, even if you click the phishing link or start downloading an infected attachment, Threat Protection Pro™ will block the process.
Strategies like the SLAM method and software like Threat Protection Pro™ will help you stay safe, but if you’re not mindful of your actions, no digital tool will protect you. Keep your data and devices safe — be cautious while browsing and pay attention to the emails you get.