How to Stop Phishing Emails with the SLAM Method
Phishing attacks are constantly evolving—and so must your defenses. While email filters from providers like Barracuda or Mimecast catch many threats, no system is foolproof. That’s why human vigilance remains your last and most critical line of defense.
Enter the SLAM method: a simple, memorable framework that empowers employees to recognize and stop phishing attempts before they cause harm.
What Is the SLAM Method?
SLAM stands for:
-
Sender: Is the email from someone you know? Is the domain legitimate?
-
Links: Hover over links—do they lead where they claim?
-
Attachments: Are you expecting a file? Is it safe to open?
-
Message: Does the tone, grammar, or urgency feel off?
This method helps users slow down and assess suspicious emails with clarity and confidence.
Breaking Down the SLAM Method
In the fight against phishing emails, the SLAM acronym is a handy tool to help spot threats. SLAM stands for Sender, Links, Attachments, and Message—important things to check when trying to identify phishing emails.
While an Internet Service Provider (ISP) router, wireless access point, or firewall may offer basic security for home users, they don’t meet the advanced protection needs of businesses. These devices typically provide minimal configurations controlled by the ISP. Consequently, this lack of customization and advanced security features leaves businesses vulnerable to sophisticated cyber threats.
Sender
Phishing attackers often impersonate trusted individuals or organizations by manipulating email addresses.
Before opening any email, verify the sender’s address:
-
-
Hover over the sender’s name to see the actual email address.
-
Look for subtle misspellings (e.g.,
micros0ft.cominstead ofmicrosoft.com). -
Remember: Legitimate company emails usually come from official domains like
support@microsoft.com, notmicrosoft-support@gmail.com.
-
Links
Attachments
Attachments can be dangerous—even from familiar contacts.
-
-
Never open attachments from unknown or unexpected senders.
-
Even if the email appears to be from someone you know, verify by contacting them through a separate communication channel.
-
Legitimate companies rarely send unsolicited attachments without prior notice.
-
Message
Despite increasingly sophisticated tactics, phishing emails still often contain red flags in the message content:
-
-
Generic greetings (e.g., “Dear User”)
-
Spelling or grammatical errors
-
Unusual tone or urgent requests
-
Suspicious formatting or logos
-
If anything feels “off,” treat the message with suspicion.
