• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

How To Protect Your Organization from Cyberattacks Before The Holidays

IT and security pros should take extra steps to protect their organization from cyberattacks this holiday season, White House, CISA urge.

December 19, 2022 Zachary Comeau Leave a Comment

NSA Programming Languages
Traytoiv/Stock.Adobe.com

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year. 

With the holidays approaching, federal officials are again warning organizations of all sizes to be on the lookout for cyberattacks and to be especially vigilant as offices empty and attention is turned elsewhere.

These warnings from the White House, U.S. Cybersecurity and Infrastructure Security Agency(CISA), and the FBI come as IT teams and vendors scramble to patch the Log4j vulnerabilities and apply patches to fix several critical vulnerabilities in Microsoft products.

Major IT vendors such as IBM, VMWare, Cisco and a host of others have released security patches over the last several days, and more are expected to come leading into the holidays. What makes patching these systems even more important is the fact that ransomware groups and nation-state actors are now beginning to leverage their sophisticated tools and techniques to exploit the vulnerabilities, Microsoft said in a new blog. 

That comes as IT pros are also applying monthly security patches from Microsoft, Adobe, Google and Apple.

In advisories to corporate executives and business leaders, the White House and CISA urge organizations to apply those patches before IT and cybersecurity staff take time off, leaving just a fraction of support staff to keep an eye on security over the upcoming break.

In addition to applying patches, White House and CISA urge organizations to take several steps to reduce the risk of a cyberattack during the holiday season, including:

  • Patching all systems to ensure criminals can’t exploit know vulnerabilities.
  • Gaining visibility into the network. The White House recommends enabling logging, paying attention and quickly investigating irregularities.
  • Mandating multi-factor authentication and password security. IT should mandate good password hygiene, which includes not using the same password across accounts and requiring regular changes. Most of all, organizations should adopt multi-factor authentication to help prevent unauthorized access to corporate accounts.
  • Make sure you have IT coverage during the holidays. The White House advises organizations to make sure someone is always paying attention to the network, and IT security personnel should be on-call in the event of a cyberattack.
  • Increase employee awareness. IT can’t do it all themselves, so the government urges organizations to conduct regular training and awareness campaigns with end users.
  • Develop an incident response plan and test it. Conduct incident response training leading up to the holidays so staff will know exactly what to do in the event of a cyberattack over the holidays.
  • Back up data. Back up systems before the holiday break, test them and make sure they are offline.
  • Stay informed about current cyber threats. There is no shortage of headlines about cybersecurity, so make sure staff are keeping up with that news and staying on top of current trends.

It’s important to note that several recent large-scale cyberattacks have occurred over long holiday weekends, including the July 4th ransomware campaign that leveraged a vulnerability in the Kaseya VSA platform and the Colonial Pipeline ransomware attack that took place over Mother’s Day weekend.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Log4j, Microsoft

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.