Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

How Organizations Can Stay Secure This Memorial Day Weekend

By Patrick Harding
American flag at sunrise

Aaron Burden via Unsplash

May 23, 2025

As Memorial Day Weekend approaches, many organizations prepare for a well-deserved break. Offices wind down, inboxes go quiet, and IT and security teams often scale back coverage. But while employees take time off, cybercriminals get to work.

Holiday weekends have become a prime hunting ground for attackers. Fewer eyes on dashboards, reduced monitoring and slower response times make these periods especially attractive for launching attacks. Threat actors know that the window for detection is wider — and they exploit this. 

Without a well-prepared security posture, organizations can find themselves not only compromised, but unaware of it until business resumes days later. The stakes are high, and the consequences can be long-lasting. 

This is why organizations must take proactive steps to bolster defenses before the weekend begins. It’s not just about protecting networks and systems — it’s about safeguarding the trust and privacy of employees, customers, and partners at a time when vigilance tends to slip.

The Ongoing Long Weekend Threat Surface

Long weekends don’t just slow down business operations — they quietly expand the attack surface. In fact, some of the most impactful cyber incidents have occurred over holiday periods. This played out last Memorial Day Weekend when the Seattle Public Library was hit by a cyberattack. The breach led to a multi-month long disruption in services and ended up costing the library over $1 million in recovery efforts. 

Recent research also shows that 86% of ransomware attacks are deployed during holidays or weekends. These aren’t random strikes. They’re carefully coordinated to coincide with moments of operational vulnerability and heightened pressure. 

From the Fourth of July to Labor Day to year-end holidays, attackers are increasingly timing campaigns to exploit moments when defenses are down, and the damage often extends well beyond the weekend. Companies need to treat holiday periods as elevated-risk windows requiring readiness, identity-layer defenses and tighter operational controls.

Identity at the Core of Modern Threats

Attackers are increasingly bypassing traditional defenses not by exploiting technical vulnerabilities, but by targeting identity. Whether it’s through phishing emails, credential stuffing, or exploiting dormant accounts, identity-based attacks are now a preferred method of entry.

According to IBM, phishing and the use of stolen or compromised credentials emerged as the leading causes of data breaches over the past year, accounting for 16% and 15% of incidents, respectively. This shift underscores a broader truth — identity is the modern attack surface. 

As part of building more resilient defenses, organizations are starting to reassess how they manage and verify identity, both for internal users and external ones. While central identity stores have become common, they can also become single points of failure. This is leading organizations to explore more distributed models for high-risk moments, including approaches that place more control and verification in the hands of users themselves.

Decentralized identity, for example, shifts away from centralized databases of credentials. Instead, individuals hold verifiable credentials issued by trusted sources, which can be shared securely when needed. This model reduces the size of credential repositories and limits how broadly credentials are reused or stored in vulnerable places.

Regardless, the goal is the same: minimizing privileges and ensuring identity verification is adaptive, based on real-time context and risk signals. During a holiday weekend, this can mean the difference between catching a breach in progress and discovering it days later.

Practical Security Steps to Implement Today

While decentralized identity is an important avenue for organizations to explore, there are also immediate actions security teams can take to improve preparedness.

Review and clean up privileged access

Ensure dormant or high-risk accounts are disabled or have temporary access removed. Conducting access reviews ahead of holiday periods is critical to minimizing exposure and ensuring that only those who truly need access are granted it.

Strengthen MFA

If multi-factor authentication (MFA) isn’t deployed universally, prioritize implementation for high-value systems and sensitive user groups. Using phishing-resistant methods, such as mobile push notifications, QR codes, hardware security keys, and FIDO-compliant authenticators, can help better protect against credential-based attacks.

Monitor for anomalies

Set up alerts for logins from unusual locations or at off-hours, and ensure someone is on call to investigate if needed. Leveraging AI or UEBA (User and Entity Behavior Analytics) can be especially helpful in flagging suspicious patterns. Additionally, providing a clear, secure channel for reporting anomalies can ensure red flags are surfaced in real time.

Communicate with employees

Remind staff to be cautious of phishing emails, especially those received just before or during the weekend, and to report anything unusual. Additionally, running a simulated holiday-weekend phishing or breach scenario — and clearly explaining the potential consequences – can help demonstrate the importance of shared responsibility in keeping the organization secure.

Securing Your Company During Memorial Day Weekend and Beyond

With 36% of consumers having reported falling victim to identity fraud, it’s never been more important for organizations to prioritize security, especially when the workforce is offline. While Memorial Day Weekend is a time for reflection and rest, it also calls for heightened vigilance. 

With a proactive, identity-first approach to security, organizations can reduce vulnerabilities — not just for one long weekend, but as part of a broader, year-round cyber resilience strategy.

KEYWORDS: holiday crime holiday security organizational resilience

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Patrick Harding is a Chief Product Architect at Ping Identity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Closed Sign on Business Door

    How companies can prepare for holiday weekend cyber threats

    See More
  • cyber security

    How CISOs can stay one step ahead of 2023’s risks, threats and attacks

    See More
  • skills-freepik1170x658.jpg

    Stuck in the cybersecurity talent chasm? Here's how industrial organizations can climb out

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing