Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

Let’s consider the situation:

GoDaddy’s Phishing Message:

When they checked their email on December 14th, GoDaddy’s employees found an email waiting for them in their inboxes, sent from “Happyholiday@Godaddy-dot-com”. Upon opening it, they found the following message, under a large picture of a snowflake emblazoned with the company’s name and “Holiday Party.” Get ready, it’s a doozy:

---

Happy Holiday GoDaddy!

2020 has been a record year for GoDaddy, thanks to you!

Though we cannot celebrate together during our annual Holiday Party, we want to show our appreciation and share a $650 one-time Holiday bonus! To ensure that you receive your one-time Bonus in time for the Holidays, please select your location and fill in the details by Friday, December 18th.

US

EMEA

Any submittals after the cutoff will not be accepted and you will not receive the one-time bonus of $650 (free money, claim it now!)

We look forward to celebrating with you again, in person next year!

---

However, no bonus reportedly awaited the approximately 500 employees who excitedly clicked through the links. Instead, they received an email from the company’s security chief two days later, informing them that they had failed the phishing test and would therefore need to retake the company’s Security Awareness Social Engineering training.

As you can imagine, this did not sit well for many of these employees… especially considering that the “record year” GoDaddy experienced came only after hundreds of employees were either reassigned or laid off entirely. Combining that with the fact that a data breach ultimately exposed 28,000 of GoDaddy customers’ credentials earlier this year, and the comments seem especially ill-advised.

GoDaddy has since released an apology for their mean-spirited bait-and-switch phishing test, releasing a statement. According to a spokesperson, “GoDaddy takes the security of our platform extremely seriously. We understand some employees were upset by the phishing attempt and felt it was insensitive, for which we have apologized.” While the company felt that the lesson was an important one to impart to their team members, there has been some acknowledgement that this was an insensitive means of doing so.

GoDaddy Isn’t the Only Company to Do This

Other companies and organizations have used similar tactics as they have worked to evaluate their internal phishing preparedness. One example came in September, when Tribune Publishing sent out a company email trying to phish employees with the promise of a targeted bonus ranging somewhere between $5,000 and $10,000. The Tribune’s attempt was also derided by the employees affected by it, one reporter tweeting that the level of cruelty was “stunning.” That company also apologized for its use of a “misleading and insensitive” email.

However, Phishing Can’t Just Be Ignored

While these companies certainly took the wrong approach to educating their users, the point still stands that phishing is a very serious risk for businesses today to contend with.

Instead of taking this approach, there are other ways to help educate your team, through seminars or even other internal evaluations. The primary issue really came from the fact that GoDaddy took advantage of a monetary promise to their employees during a time when many people are already financially strapped, with seemingly no intention of giving them this bonus.

Obviously, this is a situation that nobody wants to find their organization in, just as nobody wants their organization to be phished. However, with Total Tech Care, there are ways to prevent the latter. Give our team a call at 866-348-2602 to learn more about how we can help you fight back against phishing, without alienating your employees.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Microsoft Office Managed Service Automation Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Wi-Fi Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Telephone Systems Covid-19 Information Information Technology Remote Spam Alert Managed Service Provider Office 365 Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Big Data Password App History Money Encryption Applications Mobile Computing Data Breach Human Resources Application Law Enforcement Remote Monitoring Paperless Office Apps Office Tips Data Storage Training Patch Management VPN Government Remote Computing Mobile Office Private Cloud How To Blockchain Managed IT Bring Your Own Device Data Management Work/Life Balance Wireless Flexibility Vulnerability Infrastructure Voice over Internet Protocol Windows 7 Marketing Gmail Word WiFi Google Drive Settings IT solutions Entertainment Website Servers Budget Two-factor Authentication Avoiding Downtime Mouse Data Security HaaS Managed Services Staff Software as a Service Display Telephone System Risk Management Cleaning Machine Learning Hacker Connectivity Remote Work The Internet of Things Employee/Employer Relationship Conferencing Lithium-ion battery End of Support RMM Education Physical Security Scam Safety Sports HIPAA Firewall Redundancy Vendor Management Keyboard USB Virtual Reality Data Protection Apple Social User Error Meetings Save Time Vendor Robot Excel Remote Workers Hiring/Firing Biometrics Computing Infrastructure Going Green Virtual Desktop Processor Update Virus DDoS Hard Drive Google Docs Battery Unified Threat Management SharePoint Shadow IT Identity Theft Computer Accessories Legal Business Intelligence Computing Audit Internet Exlporer Worker IT Management Customer Service Environment Augmented Reality PDF Fraud Botnet Printer IT Plan Fax Server Bluetooth Remote Worker Digital Signage Proactive IT Unsupported Software SaaS Cryptocurrency Best Practice YouTube Charger IT Consultant Procurement Black Market Network Congestion Workplace Strategy Compliance Comparison Net Neutrality OneNote eWaste Computer Care CES Humor Help Desk Current Events Printing Document Management Telephony Solid State Drive Wireless Technology Samsung Content Management How to Downtime Business Technology Access Control Wearable Technology Value Managed Services Provider Hard Drives Data storage Retail Virtual Assistant Electronic Medical Records Instant Messaging Authentication Database Automobile Spam Blocking Screen Mirroring Running Cable Loyalty WIndows 7 Cables Windows Server 2008 R2 Memory Frequently Asked Questions Monitor Customer relationships Books Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Mobile Windows 10s Cast Cortana Digital Signature Managed IT Service Security Cameras Tip of the week Reputation webinar Computer Tips Streaming Media Emergency Warranty Virtual CIO Tech Support Employer Employee Relationship OneDrive Biometric Security Content Professional Services Public Cloud PowerPoint Techology Windows Media Player Laptop Assessment HVAC Peripheral Science User Google Apps Analysis Using Data Windows Server 2008 Customers Digital Security Cameras Administrator Devices Copiers 5G Audiobook Tools Distributed Denial of Service Touchpad Television Customer Relationship Management Enterprise Content Management Quick Tip Managing Stress Analyitcs Accountants Smartwatch MSP Ergonomics Advertising Microchip Programming Thought Leadership Development Credit Cards OLED Politics Cameras Public Computer Password Management PCI DSS Password Manager Virtual Machine Notifications Transportation Fiber Optics Multi-Factor Security Employee Regulations 2FA Computer Fan Antivirus Search Engine Rootkit Twitter Messaging Cabling NIST Policy Windows 8 Business Mangement Hypervisor Dark mode Benefits Smart Tech Trend Micro Trending Relocation Workers IT service FENG Addiction SMS Amazon Default App Printer Server Recycling Saving Time Video Games IBM Procedure Tablet Wiring dark theme Smart Technology Practices Shopping Google Search Worker Commute Flash Domains Cache AI Amazon Web Services IT Infrastructure Experience Criminal Bing Scalability Software Tips IaaS Supercomputer Maintenance Safe Mode FinTech GDPR Bloatware Hosted Computing Social Network Business Owner Sync Emails NarrowBand Wireless Internet Online Shopping Investment Tablets Employee/Employer Relationships Search File Sharing Employees Camera Windows 365 Two Factor Authentication Entrepreneur Inventory Specifications ISP iPhone Netflix Root Cause Analysis Wire Video Conferencing Evernote ROI Bitcoin Travel Shortcuts HBO Knowledge Shortcut Sales Music Printers Point of Sale Cost Management Personal Consultant Millennials Cryptomining Skype Files Analytics Data loss Chromecast Social Networking Smart Office Supply Chain Management Wireless Charging Batteries Outlook Leadership Monitoring Troubleshooting Virtual Private Network Windows 8.1 Uninterrupted Power Supply Digitize Best Available Workforce Start Menu Colocation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code