Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

Let’s consider the situation:

GoDaddy’s Phishing Message:

When they checked their email on December 14th, GoDaddy’s employees found an email waiting for them in their inboxes, sent from “Happyholiday@Godaddy-dot-com”. Upon opening it, they found the following message, under a large picture of a snowflake emblazoned with the company’s name and “Holiday Party.” Get ready, it’s a doozy:

---

Happy Holiday GoDaddy!

2020 has been a record year for GoDaddy, thanks to you!

Though we cannot celebrate together during our annual Holiday Party, we want to show our appreciation and share a $650 one-time Holiday bonus! To ensure that you receive your one-time Bonus in time for the Holidays, please select your location and fill in the details by Friday, December 18th.

US

EMEA

Any submittals after the cutoff will not be accepted and you will not receive the one-time bonus of $650 (free money, claim it now!)

We look forward to celebrating with you again, in person next year!

---

However, no bonus reportedly awaited the approximately 500 employees who excitedly clicked through the links. Instead, they received an email from the company’s security chief two days later, informing them that they had failed the phishing test and would therefore need to retake the company’s Security Awareness Social Engineering training.

As you can imagine, this did not sit well for many of these employees… especially considering that the “record year” GoDaddy experienced came only after hundreds of employees were either reassigned or laid off entirely. Combining that with the fact that a data breach ultimately exposed 28,000 of GoDaddy customers’ credentials earlier this year, and the comments seem especially ill-advised.

GoDaddy has since released an apology for their mean-spirited bait-and-switch phishing test, releasing a statement. According to a spokesperson, “GoDaddy takes the security of our platform extremely seriously. We understand some employees were upset by the phishing attempt and felt it was insensitive, for which we have apologized.” While the company felt that the lesson was an important one to impart to their team members, there has been some acknowledgement that this was an insensitive means of doing so.

GoDaddy Isn’t the Only Company to Do This

Other companies and organizations have used similar tactics as they have worked to evaluate their internal phishing preparedness. One example came in September, when Tribune Publishing sent out a company email trying to phish employees with the promise of a targeted bonus ranging somewhere between $5,000 and $10,000. The Tribune’s attempt was also derided by the employees affected by it, one reporter tweeting that the level of cruelty was “stunning.” That company also apologized for its use of a “misleading and insensitive” email.

However, Phishing Can’t Just Be Ignored

While these companies certainly took the wrong approach to educating their users, the point still stands that phishing is a very serious risk for businesses today to contend with.

Instead of taking this approach, there are other ways to help educate your team, through seminars or even other internal evaluations. The primary issue really came from the fact that GoDaddy took advantage of a monetary promise to their employees during a time when many people are already financially strapped, with seemingly no intention of giving them this bonus.

Obviously, this is a situation that nobody wants to find their organization in, just as nobody wants their organization to be phished. However, with Total Tech Care, there are ways to prevent the latter. Give our team a call at 866-348-2602 to learn more about how we can help you fight back against phishing, without alienating your employees.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Internet of Things Networking IT Support Wi-Fi Hacking Telephone Systems Covid-19 Information Technology Information Remote Alert Managed Service Provider Spam Office 365 Router Recovery Employer-Employee Relationship Bandwidth BDR Social Engineering Mobility Encryption App History Applications Mobile Computing Application Law Enforcement Human Resources Data Breach Remote Monitoring Big Data Password Money Office Tips Blockchain Training Paperless Office Data Storage VPN Patch Management Government Private Cloud Remote Computing Managed IT Mobile Office Apps How To Flexibility Marketing Wireless WiFi Google Drive IT solutions Entertainment Website Gmail Budget Vulnerability Settings Windows 7 Avoiding Downtime Word Infrastructure Voice over Internet Protocol Two-factor Authentication Servers Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Data Security End of Support Risk Management Hacker Education Physical Security Safety Employee/Employer Relationship The Internet of Things Lithium-ion battery HIPAA Sports RMM Staff Redundancy Software as a Service Telephone System Conferencing Keyboard Machine Learning USB Connectivity Remote Work Scam Firewall Virtual Reality Apple Vendor Management Save Time Social User Error Data Protection Cleaning Meetings Vendor Managed Services Display Biometrics Computer Accessories Shadow IT Content Management Virtual Desktop Spam Blocking Electronic Medical Records Business Technology Legal Processor Access Control Internet Exlporer DDoS Hiring/Firing Virtual Assistant Hard Drive Authentication SharePoint PDF Printer Bluetooth Computing Proactive IT Update Customer Service Environment Best Practice Business Intelligence YouTube Black Market Google Docs Fax Server Audit Worker IT Consultant Digital Signage Identity Theft IT Management Humor SaaS Botnet Document Management IT Plan Wireless Technology Solid State Drive Augmented Reality How to Procurement Downtime Workplace Strategy Net Neutrality Fraud Network Congestion Unsupported Software eWaste Remote Worker Data storage Help Desk Charger Automobile Printing Compliance Cryptocurrency OneNote Computer Care Current Events Computing Infrastructure Going Green Wearable Technology Telephony Managed Services Provider Comparison Retail Hard Drives Samsung Instant Messaging Database Virus CES Robot Excel Battery Remote Workers Unified Threat Management Value Leadership Email Best Practices Audiobook Troubleshooting IT Assessment Wire Manufacturing Evernote Outlook Touchpad Start Menu Travel Managing Stress Printers Managed IT Service Security Cameras Millennials Screen Mirroring Loyalty Computer Tips Frequently Asked Questions Virtual CIO Politics Books OneDrive Smart Office Advertising Biometric Security Cameras Wireless Charging Mobile Windows 10s Science Peripheral Digital Security Cameras Virtual Private Network Using Data Workforce Notifications Cast Tip of the week webinar Emergency Copiers 5G Cables Distributed Denial of Service Professional Services Customer Relationship Management Public Cloud Employer Employee Relationship Quick Tip Analyitcs Assessment Ergonomics Project Management Nanotechnology Relocation Smartwatch Telecommuting Windows Server 2008 Programming Development OLED Printer Server Cortana Video Games Virtual Machine Digital Signature Tools PCI DSS Television 2FA Warranty Worker Commute Fiber Optics Employee Google Apps Antivirus Experience Messaging HVAC Cabling Scalability Hypervisor Analysis Windows 8 Policy Public Computer Dark mode Administrator Business Owner Trend Micro Devices IT service NarrowBand Regulations Transportation SMS Enterprise Content Management Default App MSP Search Saving Time Accountants Computer Fan Tablet Rootkit Procedure dark theme Microchip Shopping Thought Leadership iPhone Google Search Credit Cards Domains Password Manager Workers Benefits AI Password Management IT Infrastructure Bing IaaS Multi-Factor Security Maintenance FENG FinTech Bloatware IBM Search Engine Social Network Consultant Twitter Files Business Mangement Chromecast Flash Smart Technology NIST Investment Analytics Employee/Employer Relationships Smart Tech Trending Tablets Employees Entrepreneur Supercomputer Windows 365 Best Available Addiction Colocation ISP Amazon Uninterrupted Power Supply Software Tips Recycling Sync Emails Video Conferencing WIndows 7 ROI Wiring Bitcoin Practices Monitor Shortcuts Shortcut Sales Cost Management Point of Sale Personal Cache Cryptomining Amazon Web Services Criminal Social Networking Netflix Two Factor Authentication Supply Chain Management Safe Mode GDPR Batteries Hosted Computing Reputation Streaming Media Root Cause Analysis Monitoring Knowledge Windows 8.1 Content Music Digitize Wireless Internet Online Shopping Tech Support HBO PowerPoint Laptop Running Cable Skype Windows Media Player User File Sharing Techology Windows Server 2008 R2 Camera Inventory Customers Specifications Data loss Memory Customer relationships

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code