Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

Let’s consider the situation:

GoDaddy’s Phishing Message:

When they checked their email on December 14th, GoDaddy’s employees found an email waiting for them in their inboxes, sent from “Happyholiday@Godaddy-dot-com”. Upon opening it, they found the following message, under a large picture of a snowflake emblazoned with the company’s name and “Holiday Party.” Get ready, it’s a doozy:

---

Happy Holiday GoDaddy!

2020 has been a record year for GoDaddy, thanks to you!

Though we cannot celebrate together during our annual Holiday Party, we want to show our appreciation and share a $650 one-time Holiday bonus! To ensure that you receive your one-time Bonus in time for the Holidays, please select your location and fill in the details by Friday, December 18th.

US

EMEA

Any submittals after the cutoff will not be accepted and you will not receive the one-time bonus of $650 (free money, claim it now!)

We look forward to celebrating with you again, in person next year!

---

However, no bonus reportedly awaited the approximately 500 employees who excitedly clicked through the links. Instead, they received an email from the company’s security chief two days later, informing them that they had failed the phishing test and would therefore need to retake the company’s Security Awareness Social Engineering training.

As you can imagine, this did not sit well for many of these employees… especially considering that the “record year” GoDaddy experienced came only after hundreds of employees were either reassigned or laid off entirely. Combining that with the fact that a data breach ultimately exposed 28,000 of GoDaddy customers’ credentials earlier this year, and the comments seem especially ill-advised.

GoDaddy has since released an apology for their mean-spirited bait-and-switch phishing test, releasing a statement. According to a spokesperson, “GoDaddy takes the security of our platform extremely seriously. We understand some employees were upset by the phishing attempt and felt it was insensitive, for which we have apologized.” While the company felt that the lesson was an important one to impart to their team members, there has been some acknowledgement that this was an insensitive means of doing so.

GoDaddy Isn’t the Only Company to Do This

Other companies and organizations have used similar tactics as they have worked to evaluate their internal phishing preparedness. One example came in September, when Tribune Publishing sent out a company email trying to phish employees with the promise of a targeted bonus ranging somewhere between $5,000 and $10,000. The Tribune’s attempt was also derided by the employees affected by it, one reporter tweeting that the level of cruelty was “stunning.” That company also apologized for its use of a “misleading and insensitive” email.

However, Phishing Can’t Just Be Ignored

While these companies certainly took the wrong approach to educating their users, the point still stands that phishing is a very serious risk for businesses today to contend with.

Instead of taking this approach, there are other ways to help educate your team, through seminars or even other internal evaluations. The primary issue really came from the fact that GoDaddy took advantage of a monetary promise to their employees during a time when many people are already financially strapped, with seemingly no intention of giving them this bonus.

Obviously, this is a situation that nobody wants to find their organization in, just as nobody wants their organization to be phished. However, with Total Tech Care, there are ways to prevent the latter. Give our team a call at 866-348-2602 to learn more about how we can help you fight back against phishing, without alienating your employees.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Gadgets Tech Term Chrome Virtualization Social Media Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Cybercrime Artificial Intelligence Operating System Computers Facebook Health Networking IT Support Wi-Fi Hacking BYOD Internet of Things Mobile Device Management Alert Information Managed Service Provider Spam Covid-19 Office 365 Telephone Systems Information Technology Remote Bandwidth Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Human Resources Password Big Data Remote Monitoring Money Encryption Applications App History Data Breach Mobile Computing Law Enforcement Application Paperless Office How To Remote Computing Managed IT Mobile Office Apps Data Storage Patch Management Office Tips Training Government VPN Blockchain Private Cloud Two-factor Authentication Bring Your Own Device Data Management Mouse Work/Life Balance HaaS Infrastructure Voice over Internet Protocol Vulnerability Windows 7 Word Flexibility Google Drive Marketing Wireless WiFi Servers IT solutions Entertainment Website Gmail Avoiding Downtime Budget Settings Data Security Staff Software as a Service Telephone System Save Time Virtual Reality Machine Learning Apple Connectivity Remote Work Vendor Social Managed Services Cleaning Display User Error Meetings Conferencing End of Support Employee/Employer Relationship Physical Security Scam Education RMM Risk Management Safety Hacker Data Protection HIPAA Sports Redundancy Keyboard The Internet of Things Vendor Management Lithium-ion battery USB Firewall Help Desk Solid State Drive Wireless Technology Samsung Downtime Printing How to SaaS Humor Value Data storage Update Automobile Spam Blocking Electronic Medical Records Managed Services Provider Network Congestion Google Docs eWaste Database Computing Infrastructure Hiring/Firing Identity Theft Remote Workers Going Green Processor Wearable Technology Battery Augmented Reality Retail Hard Drives Shadow IT Fraud Hard Drive Virus Instant Messaging Legal Business Intelligence Excel Robot Remote Worker Unified Threat Management Audit Internet Exlporer Worker Computing Computer Accessories Biometrics IT Management Cryptocurrency Virtual Desktop Botnet PDF IT Plan Comparison DDoS Proactive IT SharePoint Digital Signage Printer Unsupported Software CES Best Practice Bluetooth YouTube Charger Black Market Content Management Business Technology Access Control Compliance Customer Service Environment OneNote Computer Care Procurement Current Events Net Neutrality Virtual Assistant Workplace Strategy Document Management Telephony Authentication IT Consultant Fax Server IT service Root Cause Analysis Employees Cables Employee/Employer Relationships Windows 365 Knowledge Music ISP HBO Skype Project Management Tablet Files Nanotechnology Video Conferencing Telecommuting ROI Bitcoin Domains Shortcuts Data loss Sales Chromecast Cortana Point of Sale Leadership Digital Signature Personal Troubleshooting Cryptomining Outlook Start Menu Warranty Colocation Supply Chain Management Uninterrupted Power Supply IaaS Maintenance Batteries Consultant Bloatware Screen Mirroring HVAC Monitoring Loyalty Google Apps Windows 8.1 Monitor Analysis Digitize Books Analytics Frequently Asked Questions Mobile Administrator Tablets Windows 10s Devices Windows Server 2008 R2 Best Available Entrepreneur Cast Enterprise Content Management Customer relationships Email Best Practices Reputation webinar Accountants IT Assessment Streaming Media Emergency WIndows 7 Manufacturing Tip of the week MSP Shortcut Content Professional Services Microchip Public Cloud Thought Leadership Tech Support Employer Employee Relationship Credit Cards Managed IT Service Security Cameras Cost Management Techology Password Management Computer Tips Laptop Assessment Password Manager Virtual CIO Customers OneDrive Multi-Factor Security Biometric Security Social Networking Windows Server 2008 Audiobook Tools Search Engine Twitter Peripheral Using Data NIST Digital Security Cameras Touchpad Television Business Mangement Windows Media Player Smart Tech Copiers Trending User Running Cable 5G PowerPoint Politics Memory Advertising Addiction Quick Tip Amazon Smartwatch Ergonomics Public Computer Recycling Practices Development Notifications Transportation Managing Stress OLED Regulations Wiring Computer Fan Cache PCI DSS Rootkit Amazon Web Services Virtual Machine Fiber Optics Employee Cameras Safe Mode 2FA Criminal Science Relocation Workers Hosted Computing Messaging Benefits Cabling GDPR FENG Wireless Internet Policy Online Shopping Hypervisor Trend Micro Video Games File Sharing Dark mode IBM Worker Commute Flash Camera Inventory SMS Smart Technology Specifications Distributed Denial of Service Default App Customer Relationship Management Experience Analyitcs Wire Procedure Evernote Saving Time Supercomputer Shopping Travel Google Search Printer Server Programming Scalability Software Tips dark theme Business Owner Sync Printers Emails AI Millennials IT Infrastructure Bing Smart Office FinTech NarrowBand Wireless Charging Social Network Antivirus Search Virtual Private Network Windows 8 iPhone Netflix Two Factor Authentication Workforce Investment

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code