Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Happens When a Raven Goes Phishing?

What Happens When a Raven Goes Phishing?

What if Edgar Allan Poe wrote “The Raven” during the information age?

Once upon a midnight dreary, while I emailed, weak and weary,
Over many a quaint and curious volume of unread mail
While I nodded, nearly sleeping, suddenly there came a beeping,
As of some notification buzzing, buzzing of a new email
"Tis some phisher" I muttered, tapping the icon "gmail"
Only this and nothing more.

Ah, distinctly I remember it was in the grey November;
I surrendered my password to member claiming to represent Facebook
Eagerly I wished I paused, for the anguish that had caused
A hacker that cares not of laws—my credentials they took
My password long and complicated, unique and rare to a crook
Kicked me off of my Facebook

When my inbox, full, staring into my slipping spirit
Tired me—tired me like nothing else had tired me ever before;
So that I, to keep my drooping eyes still open, I kept clicking
To the message following the one I read before—
Each new message following the one I read before—
That was my goal, nothing more.

Gradually my eyes grew heavy, exhaustion’s lure pulling down,
Click, again, and skimming, slowly I processed my email;
But the fact is I was slacking, and while dozing they came hacking,
And an email they sent chiming, chiming in my mail folder,
The alert tone faint, but there, sure—here I clicked the folder—
To see what was in my mail.

The note that had come opened, long I sat there looking, reading,
Wondering, dreaming things I had never dared to dream before;
But the message was still there, and as far as I was aware,
The message that it bore was the pointed promise “Much more!”
This I read, and again I said to myself “much more!”
Not seeing what was in store.

With renewed strength pushing forward, I moved my cursor slowly toward
The email that made a promise that I couldn’t just ignore.
“Surely,” said I, “surely it is something that would help the business,
Let me see then, what isthmus I have been sent to, to explore,
Let me help my job a little and this message I’ll explore,”
Not seeing what was in store.

Clicking firm on the mail icon, I, watching the small cursor strike on,
Saw the note in full appear with its full promise at the fore,
“Make more money with this data”, with a folder pinned and ready,
And, with not a thought of issue, clicked into the folder’s stores,
Waiting to see a trove of insights held inside the folder’s stores,
Not seeing what was in store.

But then panic struck, intestines in my belly intertwining,
By the dire and stern consequence of its disclosure. I swore,
“I have just been phished and hacked, and my data has been ransacked,
Without all the data that I need my chance of success is slim to poor
Oh, if only I had listened when I was warned of phishing lures!
If I only knew what was in store!

I sat there helplessly as malware locked and altered files,
Feeling my heart sink through my chest as I predicted what was in store.
I would update my resume but alas, I feel this makes me an automatic pass
With a record like this, I’ll never be considered for work any more
All because some cybercriminal targeted me for their score…
Oh, if only I knew what was in store.

Quoth Voyage Technology, Never More.

Here at Voyage Technology, we’re all too familiar with these kinds of events—and, more importantly, how to train your team members to avoid this and similar outcomes. Give us a call at 800.618.9844 to learn more, and Happy Halloween!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft AI Saving Money Passwords Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Automation Facebook Holiday Training Gadgets Compliance Cloud Computing Covid-19 IT Support Outsourced IT Server Remote Work Managed Service Provider Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Blockchain Managed Services Apps Data Security Two-factor Authentication Vendor Mobile Office Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Voice over Internet Protocol Apple App Employer-Employee Relationship Networking BYOD Access Control Password Conferencing Managed IT Services How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Physical Security Marketing Applications Office 365 Analytics Office Tips Augmented Reality Health 2FA Help Desk Storage Bring Your Own Device Retail Big Data Healthcare Operating System Computers Risk Management Router Website Virtual Private Network Printer Firewall Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management The Internet of Things Managed IT Service Remote Workers Social Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Customer Service Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Display Outlook Computer Repair Mobile Security Processor Holidays Money Humor Data Storage Smart Technology Supply Chain Safety Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Virtual Machines Mouse Professional Services Administration Maintenance Antivirus Downloads iPhone Licensing Vulnerabilities Entertainment Customer Relationship Management Data Privacy Settings Wireless Printing Content Filtering Images 101 Hacking YouTube Telephone System Multi-Factor Authentication Presentation Robot Mobility Cost Management Cryptocurrency Wireless Technology IT Management Virtual Desktop VPN Employees Meetings Data storage Integration LiFi Word User Tip Modem Virtual Assistant Outsource IT Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Refrigeration Media Halloween Proxy Server Reviews Cookies Public Speaking Monitors Cyber Monday Medical IT Lithium-ion battery Hotspot Transportation Small Businesses Tactics Development Websites Mirgation Hypervisor Displays Hacks Entrepreneur Scary Stories Fun Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Deep Learning SharePoint Addiction Management PCI DSS Chatbots Undo Navigation Education Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Mobile Computing Evernote Paperless Co-managed IT Search Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Application Best Practice Financial Data Error History Business Communications Buisness Social Engineering Break Fix Scams IT solutions Browsers Smartwatch Connectivity IT IBM Legal Upload Procurement Remote Computing Azure Hybrid Work Business Growth Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Cortana CES Tablet IoT Communitications Trends Supply Chain Management Alert Alt Codes Managed IT Customer Resource management FinTech File Sharing Regulations Competition Dark Data Google Calendar Term Google Apps Downtime How To Microsoft Excel IT Maintenance Hosted Solution Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Typing Organization Travel Social Networking Legislation Shortcuts Google Drive Ransmoware User Knowledge Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors 5G Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive IP Address Google Docs Permissions Workforce Unified Communications Experience Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats Bitcoin Running Cable Trend Micro Google Wallet Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Recovery User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Hard Drives Windows 8 Laptop Point of Sale eCommerce Domains Drones Black Friday SSID

Blog Archive