Cyberside Chats: Cybersecurity Insights from the Experts

Holiday Horror Stories: Why Hackers Love Long Weekends


Listen Later

Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail breaches around Thanksgiving to a cyber hit on Krispy Kreme, they break down what makes holidays such a juicy target—and how to better defend your organization when most of your team is off the clock.

 

Takeaways:
  1. Treat Holiday Weekends as Elevated Threat Windows
  2. Plan and staff accordingly. Threat actors deliberately strike when visibility and response capacity are lowest—your incident response posture should reflect that heightened risk.
  3. Establish and Test Off-Hours Response Plans
  4. Ensure escalation paths, contact protocols, and technical procedures are defined, reachable, and tested for weekends and holidays. On-call responsibilities should be clearly assigned with appropriate backups.
  5. Reduce Your Attack Surface and Harden Perimeter Before the Break
  6. Conduct targeted patching, vulnerability scans, and privilege reviews in the days leading up to any holiday period. Temporarily disable or restrict non-essential access and remote administration rights.
  7. Practice Incident Response Tabletop Exercises With Holiday Timing in Mind
  8. Simulate scenarios that unfold over weekends or during staff absences to uncover timing-based gaps in coverage, decision-making, or escalation. Make sure playbooks account for limited availability and stress-test your team’s ability to respond under real-world holiday constraints.
  9. Communicate Expectations Across the Organization and With 3rd Parties
  10. Brief relevant teams (not just security) on the increased risk. Reinforce secure behaviors, clarify how to report suspicious activity, and keep business units informed about potential delays or escalation protocols. Talk with your MSP and other 3rd party vendors to ensure they have consistent monitoring and know who to contact if there is an incident (and vice versa).
    Resources:
    • MOVEit Data Breach Timeline – Rapid7
    • Kaseya Ransomware Attack Explained – Varonis
    • Bangladesh Bank Heist – Darknet Diaries Episode 72
    • Tabletop Exercises & Incident Response Planning – LMG Security
    • #cybersecurity #dfir #incidentresponse #ciso #cybersidechats #cybersecurityleadership #infosec #itsecurity #cyberaware

      ...more
      View all episodesView all episodes
      Download on the App Store

      Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside

      • 5
      • 5
      • 5
      • 5
      • 5

      5

      2 ratings


      More shows like Cyberside Chats: Cybersecurity Insights from the Experts

      View all
      No Agenda Show by Adam Curry & John C. Dvorak

      No Agenda Show

      5,951 Listeners

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      370 Listeners

      The DSR Network by The DSR Network

      The DSR Network

      1,760 Listeners

      Conspirituality by Derek Beres, Matthew Remski, Julian Walker

      Conspirituality

      2,042 Listeners

      What Rough Beast by Virginia Heffernan and Stephen Metcalf

      What Rough Beast

      61 Listeners