Cybersecurity Threats: Make Hackers Hate The Holidays

cybersecurity threats: make hackers hate the holidays

It’s the week before holiday break. No doubt there’s plenty on your plate. Kids free from school, last-minute work projects, trying to guess what your teenage niece wants for Christmas. Cybersecurity threats should be last on that list.

But every year, we see an alarming pattern.

Businesses go on skeleton crew and cybersecurity threats strike. No one’s in the office, no one’s at home to help, no choice but to call an expensive Hail Mary. It’s an annual reality for too many companies.

So the big question this time of year is: Who’s handling your IT when everyone’s gone?

Statistics on Holiday Cybersecurity Threats

Let’s go through some eye-opening facts:

  • DDoS attacks are highest at this time of year
  • DDoS attacks almost doubled in Q4 2019 compared to 2018
  • 28% of attacks happen on the weekend
  • Majority of cybersecurity threats are malware, social engineering, hacking and DDoS attacks
  • In 2019, phishing emails were the biggest threat for schools, healthcare businesses and government entities
  • Commonly targeted industries in Q4 are healthcare, finance and government

Sources: Curotec, BitNinja, Deccan Chronicle, iVenture

Defined For You: What is DDoS — Distributed Denial-of-Service and other threats?

These charts present a detailed picture of December 2019’s cybercrime landscape. We can assume 2020 will follow a similar pattern.

cybersecurity threat motivations pie chart

As you can see, the majority of malicious intent is based on actual crime. Hackers are done spying, they’re acting out on knowledge gathered from weeks and months past.

cybersecurity threat attack methods pie chart

This chart shows the incredible amount of ways hackers commit crime. In Q4 of 2019, malware was the most common technique, followed by hijacking, then targeted attacks and SQL injections.

Chart Source: Hackmageddon

Defined For You: SQL injections, drive-by downloads and more weird cybersecurity threats

The Answer To Holiday Cybersecurity Threats

Don’t sacrifice your well-deserved holiday time to hackers. There’s a way to monitor and manage cybersecurity without being on-call on Christmas day. Cover all bases with a managed service provider (MSP).

What is a Managed Service Provider?

A managed service provider (MSP) provides end-to-end IT and security services. With an MSP, your entire IT environment is handled from one trusted resource.

MSPs fill four important roles that businesses need. Resource, Guide, Facilitator and Guardian. This shield sums up the roles and responsibilities nicely.

MSPs are the reinforcement to business security. Just be sure it’s an A+ MSP, That means:

  • 24/7/365 support
  • True fixed-fee plans
  • Predictable IT spend
  • Unlimited onsite and remote support
  • No surprise “Big Project” bills
  • Dedicated team structures
  • Full transparency and reporting

Let’s get real. December isn’t the only month for cybersecurity. Companies need defense year-long. So make it a Christmas gift or a New Year’s wish come true for your business.

This article originally appeared on

Sign up for the Tech Tribune, our monthly curated newsletter, to get more IT tips for your business.




Business-friendly IT is possible. We delve into the engaging and actionable ways for you to get there.

Recommended from Medium

On Threat Detection Uncertainty

Getting started with great domain names at hackathons

Fugu jailbreak — Fugu 14 unc0ver

Coronavirus Is a Cybercriminal’s Best Friend

Threat Detection & Hunting with Google Chronicle Security

Duo Multi-Factor Authentication with WSO2 Identity Server

{UPDATE} PokerUp: Texas Holdem Poker Hack Free Resources Generator

The CertiK January Roundup

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
iVenture Solutions

iVenture Solutions

We deliver superior IT solutions to businesses. Let’s talk. Contact us at Let’s connect on FB, IG, YT, LinkedIn & Twitter — @iVentureFL

More from Medium

[EN] TryHackMe 25 Days of Cyber Security: Day 2 Walkthrough

How to Stop Hackers Even If You Suck at Computers: 5 Easy Changes

Who did call a runtime broker, and why is it running on my computer?

T’was the Night Before the Breach (2021 Edition)