{"id":6996,"date":"2025-08-22T13:07:32","date_gmt":"2025-08-22T11:07:32","guid":{"rendered":"https:\/\/www.opensight.nl\/?p=6996"},"modified":"2025-09-03T15:50:13","modified_gmt":"2025-09-03T13:50:13","slug":"do-hackers-go-on-summer-holiday","status":"publish","type":"post","link":"https:\/\/www.opensight.nl\/en\/blog\/do-hackers-go-on-summer-holiday\/","title":{"rendered":"Do hackers go on summer holiday?"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Summer is just around the corner. For many people, this is a time to get away, recharge their batteries and enjoy some peace and quiet. But cybercriminals? They don&#8217;t take holidays. While employees log off, these guys remain active. And that makes the summer period a vulnerable time for many organizations.     <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cyber threats don&#8217;t take time off<\/strong><\/h3>\n\n\n\n<p>Although the image of a hacker in sunglasses on a beach chair might be amusing, the reality is less light-hearted. Companies operating with reduced staffing levels are particularly vulnerable to cyberattacks. Cybercriminals are quick to exploit these gaps with targeted attacks, summer phishing campaigns, and the misuse of unprotected devices.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why the summer is particularly risky<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced vigilance<\/strong> With employees on holiday and IT teams understaffed, monitoring is on the back burner. This can result in suspicious signals or reports being overlooked. <\/li>\n\n\n\n<li><strong>More travel = more risks<\/strong> Working from a holiday location or on the road often means using public Wi-Fi, unfamiliar devices and less secure connections.<\/li>\n\n\n\n<li><strong>Seasonal scams<\/strong> Cybercriminals capitalise on current events. Think phishing emails about holiday bookings, package deals or fake travel information. <\/li>\n<\/ul>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.opensight.nl\/content\/hackers-op-vakantie-edited.jpg\" alt=\"\" class=\"wp-image-7007\" srcset=\"https:\/\/www.opensight.nl\/content\/hackers-op-vakantie-edited.jpg 1000w, https:\/\/www.opensight.nl\/content\/hackers-op-vakantie-edited-300x300.jpg 300w, https:\/\/www.opensight.nl\/content\/hackers-op-vakantie-edited-150x150.jpg 150w, https:\/\/www.opensight.nl\/content\/hackers-op-vakantie-edited-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<p><strong><br\/><br\/><\/strong><strong>What can you do to stay safe?<\/strong><\/p>\n\n\n\n<p>It is particularly important to remain alert during the summer. A few basic tips: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ensure up-to-date systems and monitoring<\/strong> Have your infrastructure continuously monitored and automate where possible.<\/li>\n\n\n\n<li><strong>Secure devices and connections<\/strong> Avoid public Wi-Fi for business applications and use strong authentication.<\/li>\n\n\n\n<li><strong>Keep your team aware and informed <\/strong>Train employees to recognise suspicious emails, even when working remotely or on holiday.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Remain digitally resilient, all year round<\/strong><\/h3>\n\n\n\n<p>A short summer break should not be a reason to let go of your digital security. With proper preparation, awareness and support, your organization will remain protected from cyber threats even during the holiday period. <\/p>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Commvault has announced that the Commvault Cloud Platform can be easily deployed from large cloud marketplaces using CIS-hardened images.<\/p>\n","protected":false},"author":11,"featured_media":6999,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Cyber threats don't stop: hackers don't take holidays","_seopress_titles_desc":"During the summer, alertness levels are lower, but hackers remain active. Read how to keep your organization secure during the holiday season.","_seopress_robots_index":"","footnotes":""},"categories":[45,14],"tags":[91,46,47],"class_list":["post-6996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current","category-security-en","tag-ai-act-en","tag-cyber-security","tag-cyber-security-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/6996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/comments?post=6996"}],"version-history":[{"count":5,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/6996\/revisions"}],"predecessor-version":[{"id":7410,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/6996\/revisions\/7410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media\/6999"}],"wp:attachment":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media?parent=6996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/categories?post=6996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/tags?post=6996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}