Skip to the main content.

Modernize & Transform

Built to help you reimagine IT operations, empower your workforce, and leverage AI-powered tools to stay ahead of the curve.

Untitled design (3)

Empower My Team

We bring together the best of Microsoft’s cloud ecosystem and productivity tools to help your people thrive.

Untitled design (3)

Build My Infrastructure

We offer a comprehensive suite of infrastructure services tailored to support your business goals today and scale for the future

Untitled design (3)

IT Services

Our managed and co-managed IT service plans deliver a responsive and innovative engagement to support your IT needs, improve employee experience, and drive growth for your business. 

Untitled design (3)

Cybersecurity Services

Sourcepass offers innovative solutions, including SOC, GRC, Security Assessments, and more to protect your business.

Untitled design (3)

Professional Services

Grow your business with cloud migrations, infrastructure refreshes, M&A integrations, staff augmentation, technical assessments, and more.

Untitled design (3)

Resource Library

Stay ahead, stay connected, and discover the future of IT with Sourcepass.

Untitled design (3)

Events & Webinars

Dive into a dynamic calendar of webinars and in-person gatherings designed to illuminate the latest in managed IT services, cybersecurity, and automation.

Untitled design (3)

Resources by Role

Explore key resources, eBooks, video trainings, and more curated for CEOs, CFOs, CIOs, CISOs, and technology leaders!

Untitled design (3)

The Sourcepass Story

Sourcepass aims to be different. It is owned and operated by technology, security, and managed services experts who are passionate about delivering an IT experience that clients love.

Untitled design (3)

The Sourcepass Experience

At Sourcepass, we’re rewriting the IT and cybersecurity experience by helping businesses focus on what they do best, while we deliver the infrastructure, insights, and innovation to help them thrive.

Untitled design (3)

 

Strengthening Cybersecurity Before Holiday Season Threat Spikes

 
Strengthening Cybersecurity Before Holiday Season Threat Spikes

Cyberattacks tend to increase during the fourth quarter when teams are stretched, staff take time off, and purchasing activity rises. This seasonal shift creates predictable gaps that threat actors exploit. Strengthening security controls ahead of these spikes helps reduce exposure and protects business continuity.

Below is a practical checklist businesses can use to reinforce cybersecurity before holiday activity accelerates.

 

Phishing Simulations and User Readiness

Phishing remains the most common entry point for attackers during the holidays. Higher transaction volume, vendor emails, and travel notifications make users more prone to clicking without reviewing context.

 

What to do

  • Run a targeted phishing simulation focused on seasonal themes such as shipping notices or payment reminders.

  • Review results with staff and provide quick refresher training.

  • Confirm reporting channels are clear so employees can escalate suspicious messages.

 

MFA Drift and Identity Gaps

Multi-factor authentication is effective, but only when consistently enforced. Over time, exceptions, legacy accounts, and stale permissions create identity drift.

 

What to do

  • Audit all accounts to verify MFA is enabled across users, admins, and service accounts.

  • Remove legacy authentication that bypasses MFA requirements.

  • Review administrative permissions and remove unused or overly broad access.

 

Review Conditional Access Policies and Auditing Logs

Seasonal work patterns often influence login behavior. Employees may work remotely, log in from personal devices, or access systems at unusual hours. Conditional Access policies should reflect these changes without opening unintended risk.

 

What to do

  • Review login patterns in Azure AD or your identity platform.

  • Validate Conditional Access rules, geographic restrictions, device compliance checks, and session controls.

  • Inspect audit logs for suspicious spikes, repeated login failures, or unusual location activity.

 

Update SIEM Rules for Seasonal Behaviors

Security Information and Event Management platforms rely on rules tuned to normal business behavior. Holiday activity can disrupt baselines.

 

What to do

  • Update SIEM rules to incorporate seasonal increases in purchasing, file transfers, or vendor requests.

  • Set alerts for high-impact events such as privilege escalation, mass file deletions, or large data movement.

  • Ensure alert routing includes coverage for staff vacation periods.

 

Check Backups Against Ransomware Readiness

Ransomware groups frequently target businesses during short-staffed months. Valid and tested backups are essential.

 

What to do

  • Test restore processes and confirm recovery time meets business needs.

  • Verify off-site or immutable backups are available.

  • Ensure backup jobs have completed successfully and review logs for failures.

 

Summary

Seasonal cyberthreat activity is predictable, which allows businesses to prepare in advance. By strengthening identity controls, running phishing tests, tuning detection rules, and verifying backups, organizations enter the holiday season with improved security and reduced operational risk.

 

FAQ

Why do cyberattacks increase during the holiday season?

Attackers target periods when businesses have reduced staff, heavier purchasing activity, and more email volume. These conditions make detection and response slower and increase the likelihood of user error.

How often should we run phishing simulations?

Most SMBs benefit from monthly or quarterly simulations, with additional targeted campaigns before high-risk seasons such as year-end.

What is MFA drift?

MFA drift occurs when accounts fall out of compliance with MFA requirements over time due to exceptions, misconfigurations, or stale user privileges.

How do we know if our backups can withstand a ransomware attack?

Backups should be immutable, tested, and stored separately from the production environment. A successful restore test is the most reliable proof.

Should Conditional Access rules change for the holidays?

Yes. As login behaviors shift, rules may need slight updates to balance usability with security. Reviewing logs and behavior patterns helps inform those changes.