Skip to Main Content
[et_pb_section fb_built="1" fullwidth="on" _builder_version="4.0.4" background_image="" inner_width_tablet="50px" inner_max_width_tablet="50px" custom_margin="-75px|||" custom_padding="||||false|false" z_index_tablet="500" locked="off"][et_pb_fullwidth_header title="What does grammar have to do with Cyber Security?" subhead="By Kevin De Snayer" text_orientation="center" background_overlay_color="rgba(0,0,0,0.3)" _builder_version="4.0.4" background_enable_color="off" custom_padding="100px||||false|false"][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built="1" _builder_version="4.0.4"][et_pb_row _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="4.0.4" z_index_tablet="500" text_text_shadow_horizontal_length_tablet="0px" text_text_shadow_vertical_length_tablet="0px" text_text_shadow_blur_strength_tablet="1px" link_text_shadow_horizontal_length_tablet="0px" link_text_shadow_vertical_length_tablet="0px" link_text_shadow_blur_strength_tablet="1px" ul_text_shadow_horizontal_length_tablet="0px" ul_text_shadow_vertical_length_tablet="0px" ul_text_shadow_blur_strength_tablet="1px" ol_text_shadow_horizontal_length_tablet="0px" ol_text_shadow_vertical_length_tablet="0px" ol_text_shadow_blur_strength_tablet="1px" quote_text_shadow_horizontal_length_tablet="0px" quote_text_shadow_vertical_length_tablet="0px" quote_text_shadow_blur_strength_tablet="1px" header_text_shadow_horizontal_length_tablet="0px" header_text_shadow_vertical_length_tablet="0px" header_text_shadow_blur_strength_tablet="1px" header_2_text_shadow_horizontal_length_tablet="0px" header_2_text_shadow_vertical_length_tablet="0px" header_2_text_shadow_blur_strength_tablet="1px" header_3_text_shadow_horizontal_length_tablet="0px" header_3_text_shadow_vertical_length_tablet="0px" header_3_text_shadow_blur_strength_tablet="1px" header_4_text_shadow_horizontal_length_tablet="0px" header_4_text_shadow_vertical_length_tablet="0px" header_4_text_shadow_blur_strength_tablet="1px" header_5_text_shadow_horizontal_length_tablet="0px" header_5_text_shadow_vertical_length_tablet="0px" header_5_text_shadow_blur_strength_tablet="1px" header_6_text_shadow_horizontal_length_tablet="0px" header_6_text_shadow_vertical_length_tablet="0px" header_6_text_shadow_blur_strength_tablet="1px" box_shadow_horizontal_tablet="0px" box_shadow_vertical_tablet="0px" box_shadow_blur_tablet="40px" box_shadow_spread_tablet="0px"] Over the years, anyone with an email account has inevitably received emails that can only be described as "questionable" at best—the grammar, style, and even formatting can at times be borderline laughable. For instance, to this day the famed and still poorly written Nigerian Prince email is still very much alive, still being circulated worldwide. And though shocking, with all of its shortcomings it still makes hundreds of millions of dollars a year—that's from a poorly written email scam. So why the bad grammar to begin with? The reality is that the majority of these types of scams originate from areas far outside of North America; for instance, Eastern Europe, Africa, Asia, Central and South America, and so on. As such, the nature of the translation can be questionable. To add to the mix, many of these email templates are available on the dark web shared by countless cyber criminals and organizations. But then, of course, the question becomes what happens if the messaging gets better? As of late, like many things in technology, there is an evolution of sorts happening to the messaging behind these nefarious types of emails. With the advent of even the most basic of grammar-checking tools available on the market today, hackers are getting smarter and, therefore, better at disguising their messages as legitimate—regardless of the poor translation techniques. To make things worse, adjacent business opportunities have arisen due to the criminal email market. As such, people and organizations (if you can call them that) have cropped up with services including communications and translation services. And like their legitimate counterparts, these services provide in-depth writing, editing, grammar checking, and so on—all meant to make the criminals appear much more professional. So what are people to do? If grammar was the first tell-tale sign that an email may be fraudulent, then other factors must be taken into consideration. My suggestion is simple: become a detective. Not only is it worth your while to educate yourself on the different types of email scams and what to look for, it can—although this may sound strange to some—be somewhat fun to do. And though perhaps that's just something coming from the guys that do this for a living, identifying scams before they happen to you is a pretty rewarding feeling. First, look at the email address, not just the sender. And though email addresses can also be spoofed, it's a good place to at least start. If an "official" email is coming from a person or company but is using a public email domain such as Gmail, Microsoft, etc., then it’s fake. Report it and hit delete. Also, look for little things such as the misspelling or misrepresentation of the domain. Here's a common one: using the letters "rn" to resemble the letter “m." At a quick glance many may never notice, but in reality may in fact be a fake “," leaving the recipient to accidentally click on a phishing email or other type of attack. And then, of course, there is the questionable attachment scenario, usually something labeled as a purchase order, invoice, etc., with a message stating that "immediate action is required.” Your best defense is education. Read as much as you can about email scams, what trends others are seeing right now, what language they use, the grammar, the domains, and more. Chances are that you already know most of these—the trick is to know when these once glaring scams have become not-so-glaring as they evolve. In short, the scams will never stop, but the good news is that you can at least stop them in their tracks. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]