Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

How companies can prepare for holiday weekend cyber threats

By Kevin O’Connor
Closed Sign on Business Door

Image via Unsplash

August 28, 2023

Like it or not, Fall is right around the corner, and the holiday season will soon follow. The Labor Day weekend that kicks off Sept. 1 may be a perfect time for companies to shut down and revel in one last dose of summer fun. But it’s also a perfect time for threat actors to take advantage of companies that have let their guard down for three or four days. 

Two summers ago, for example, the REvil ransomware gang hit more than 1,000 companies on July 2 — at the start of a four-day weekend — with a vulnerability in Kaseya’s remote monitoring software. Timing the attack for the beginning of the Independence Day holiday was an effective way to mute a forceful response.

A holiday weekend might flatten the attack surface for a company since employees are out of the office and not checking emails or using systems, but it also means there are fewer members of the IT staff on hand to detect and respond to an attack. Particularly with small and midsize companies, where small IT staffs are already overstretched, holidays present an opportunity for attackers to launch ransomware or other attacks before companies know what hit them.

Whether it’s Labor Day, the upcoming winter holiday season, or any other long weekend on the calendar, companies need to ensure their ability to detect and respond to attacks at any time, regardless of the IT and security staff on hand. Even though many may enjoy this time off, the threat actors may be hard at work.  

Proactive steps to reduce the attack surface

Every organization needs to have a thorough and effective incident response plan in place, clearly outlining how it will prepare for, identify, contain, eradicate and recover from an attack. A response plan, of course, is a year-round blueprint. In case of extended holidays when security staffing is light, you can take extra steps to limit the attackers’ ability to get into the network.

The proactive steps an organization can take include:

  • Limit network access. Consider temporarily shutting off system access to non-essential personnel. There are pros and cons since, depending on the business, some employees may need access at unusual hours. But it is a step to consider. Enabling login restrictions is one way to force employees to relax and unwind while lightening the load for your IT and security staff.
  • Let SOAR do its job. Tune Security Orchestration, Automation and Response (SOAR) tools to automate more tasks than usual while the company is closed for business. Since most employees will be logged-off during a holiday weekend, organizations can ratchet up a SOAR system’s actions with less of a concern that employees might trigger a false alarm and lock themselves out.
  • Hold off on upgrades. A core aspect of security is availability, so it’s best to hold off on any major, potential system-breaking updates and upgrades until after the holiday unless you know that there will be enough IT staff members or provider personnel on hand to manage an emergency or intervene if anything goes wrong.
  • Spread the word about holiday phishing. In advance of the holiday, it’s a good idea to warn employees to be on the lookout for holiday-related phishing attempts, perhaps by offering training with examples of what those phishing attempts may look like. Threat actors are known for using fake holiday sales and offers to lure people into clicking on malicious links. Attackers also exploit holidays — especially the winter holidays — to conduct a range of other scams. The FBI offers tips on recognizing and avoiding scams, including credential theft, potentially leading to business asset compromise.

Managed services are a year-round option

In an ideal world, businesses and other organizations would always have a fully staffed security operations center (SOC) on the job to respond to attacks. But most businesses, particularly small and midsize businesses, don’t live in an ideal world. For them, precautionary steps can help protect systems during long holiday weekends, but they also may want to consider bolstering security with a third-party service, such as managed detection and response (MDR).

Cyber threats operate globally and persistently any time of day or night, all year round. MDR services can provide continuous monitoring, analysis, detection and remediation, as well as full visibility into an organization’s network and infrastructure. MDR also can be paired with a virtual SOC to enhance quick response and recovery.

For mid-market organizations with limited IT and security resources, outsourcing 24/7 coverage with MDR can help secure systems against sophisticated attacks throughout the year, holidays included, and greatly extend their in-house cyber capabilities. That’s one of the big reasons why MDR is such a fast-growing market.

Before leaving, make a final check

Before leaving for a long weekend or holiday, IT and security staff should have a checklist, much like checking their tires and wiper fluid, before embarking on a road trip. A checklist should at least cover the basics, such as:

  • Are (automated) backups in place?
  • Is our incident response plan up to date?
  • Who is on-call if a security incident does happen?

Make sure they have proper call chains and procedures set up, including disaster recovery plans, backups and incident response plans. 

Holidays are a time to relax, not worry. Taking precautionary steps to protect systems when employees — including IT and security staff — are away from the job can help ensure that everyone is able to get the well-earned rest they deserve.

KEYWORDS: cyber threats holiday security phishing ransomware Security Operation Centers Security Operations Center (SOC)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin O’Connor is the Director of Threat Research at Adlumin.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber laptop2

    5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

    See More
  • office desk setup with laptop

    How security leaders can prepare for emerging threats

    See More
  • CCPA

    State Privacy Regulations Are Long Overdue: How Can Companies Prepare?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing