Did your cyber defences hold up during Black Friday and Cyber Monday?

01/12/25 Wavenet
Did your cyber defences hold up during Black Friday and Cyber Monday?

Cyber Monday and Black Friday have come and gone, with the UK consistently ranking second in global participation to what is the biggest online shopping event. Each year continues to set new records, Barclay’s predicted that UK shoppers would spend a whopping £10.2bn Black Friday 20251.

For consumers, it's a perfect mix of discounts and seasonal spending. For retailers, it’s a high-stakes revenue driver. But for cyber criminals, it’s the perfect opportunity.

If last year felt tense, chaotic, or if you experienced suspicious emails, system slowdowns, or website performance issues, you're not alone. And now is the ideal time to strengthen your defences before your next seasonal peak.

 

What do Black Friday and Cyber Monday expose?

1. Phishing and malware spikes

Cyber Monday is one of the worst days of the year for phishing emails. Scammers flood inboxes with fake offers, bogus shipping updates, and convincing replicas of major retailers’ websites.

Even if your business doesn’t take part in Cyber Monday, you’re still at risk. Employees shopping on work devices or simply checking personal emails during breaks could have easily opened the door to malware.

It only takes one employee clicking a malicious link for malware to spread quietly across your systems, keylogging, stealing data, or lying dormant until the attacker chooses to deploy ransomware.

If anything, suspicious happened internally last week, consider it an early warning.

 

2. Website performance and downtime

For online retailers, Black Friday and Cyber Monday traffic is a blessing, until it isn’t. High demand exposes weak points in infrastructure, and attackers know this is the single most profitable day to cause disruption.

Distributed Denial of Service (DDoS) attacks remain common, but more sophisticated, targeted attacks are increasingly used to take down sites or extort payment. Even short outages can be financially and reputationally devastating.

If your site slowed down, suffered interruptions, or behaved unpredictably this year, now is the time to investigate why.

 

3. Credential-stuffing and account takeover attempts

The shopping season is prime time for attackers to leverage previously stolen passwords. With thousands of customers logging in, criminals run automated scripts to test leaked credentials and compromise accounts.

For businesses, this exposes:

  • Weak or reused passwords among customers and staff.
  • Insufficient multi-factor authentication (MFA).
  • Gaps in monitoring for unusual login patterns.

If you noticed unexplained login attempts or customer-account resets, this was a warning sign.

 

4. Third-party and supply-chain weaknesses

Retailers rely heavily on payment processors, delivery partners, marketing platforms, and web-hosting providers.

 

Black Friday/Cyber Monday traffic often reveals:

  • Poorly secured third-party plugins.
  • API vulnerabilities.
  • Misconfigured integrations under load.

If a partner system slowed down or malfunctioned, it may have created data-exposure risks or attack pathways into your environment.

 

5. Gaps in monitoring and incident response readiness

Finally, the holiday surge exposes which organisations can actually detect and respond to threats in real time.

Many learned the hard way that:

  • Logs weren’t being collected centrally.
  • Alerts weren’t configured correctly.
  • Overnight/weekend coverage was weak.
  • No one was watching critical systems when volumes peaked.

These gaps are exactly why managed detection and response (MDR) makes such a difference.

Avoid the same problems next time...

Cyber attacks continue to rise, and this period is a prime target for criminals. Preparation can’t start a week before the holiday period, it needs to be built into your year-round cyber posture.

That’s where our 24/7/365 managed detection and response service comes in.

Our MDR service works by:

  • Proactively searching for threats and signs of intruders.
  • Analysing massive amounts of log data from your system, using a mixture of human and artificial intelligence to search for signs a hacker or malware may be attempting to break into (or already inside) your network.
  • Triaging these alerts to assess the risk and scale of security events.
  • Remediation – our 24/7/365 security operations centre responds to the incident and escalates to our cyber security incident response team (CSIRT).

Our MDR solution spots threats as soon as is possible (detection) and nips them in the bud (response) before they are able to develop into an issue that could harm your business.

We know that Cyber Monday is a time for heightened awareness of the risks. Whether you’re involved in online retail or not, this period sees more cyber attacks and phishing emails than the rest of the year.

Don’t risk a disaster, reach out to one of our cyber security specialists today.

Latest blogs

See all posts
windows-11
Understanding Windows 10 Extended Security Updates (ESU) - what your business needs to know in 2026

As of 14 October 2025, Microsoft officially ended free security updates for Windows 10. Organisations that continue operating Windows 10 devices today - in 2026 - are now doing so in a post‑support environment, relying either on paid Extended Security Updates (ESU) or accepting increasing cyber risk. Windows updates are the backbone of endpoint security, identifying new vulnerabilities and closing them before attackers exploit them. Since the end of support deadline passed, unpatched vulnerabilities accumulate quickly, creating growing exposure across any estate still running Windows 10. Continuing with Windows 10 in 2026 can lead to: Higher cyber‑attack risk, particularly ransomware Compliance issues (Cyber Essentials, ISO 27001, GDPR, FCA/financial sector requirements) Reduced software compatibility with modern applications and security tools Increased helpdesk overhead due to outdated hardware and OS issues For organisations, this is no longer preparation for a future deadline - it’s about reducing risk now and completing the transition to a modern, supported operating system. Your organisation’s options in 2026 Businesses now have three strategic pathways depending on their hardware, budget cycle, and deployment readiness. 1. Upgrade existing compatible devices to Windows 11 If your current hardware meets Microsoft’s requirements, upgrading remains the fastest and most cost‑effective way to move away from Windows 10 ESU dependency. Benefits include: Ongoing security updates Modern protection (TPM 2.0, enhanced kernel security, improved identity protection) Support for AI‑powered features and future Microsoft roadmaps Lower risk and long‑term stability If your business has Windows 10 machines still capable of upgrading, this should be the first route explored. 2. Refresh your estate with Windows 11‑ready devices Many Windows 10 machines still in use in 2026 are now five to eight years old, and often: Fall below modern security standards Cause productivity bottlenecks Increase support tickets Consume disproportionate IT resources A structured hardware refresh offers: Predictable lifecycle management Improved reliability and performance Standardisation across departments Compatibility with modern security and MDM tooling Wavenet supports staged refresh programmes aligned with fiscal planning, ensuring minimal business disruption. 3. Continue using Windows 10 with Extended Security Updates (ESU) Microsoft’s Windows 10 ESU programme is still available, but it is: Paid per device, per year Increasing in cost each year (designed to encourage migration) Security‑only - no features or performance improvements A temporary safety net, not a long‑term strategy ESU is most appropriate when: Line‑of‑business applications are not yet Windows 11 certified You need additional time for a phased rollout Budget cycles are delaying upgrades or refresh Remote / operational environments require longer transition periods Most organisations still using ESU in 2026 should plan to exit it within the next 12–24 months. Assessing your Windows 11 readiness in 2026 At this stage, businesses need more than a simple device‑level compatibility check. A comprehensive analysis includes: Hardware readiness across the estate Application and vendor compatibility Driver and firmware validation Intune / MDM alignment Security baselines and policy impacts User profile and data considerations Deployment sequencing and pilot planning Wavenet offers full readiness assessments to provide a clear view of which devices can be upgraded, which require replacement, and where ESU may remain temporarily necessary. Why 2026 is a critical year for migration With the end of support now behind us, delaying migration further increases: Security exposure Operational risk Compliance penalties ESU costs End‑user frustration from aging hardware A well‑structured migration programme delivers: A secure, modernised endpoint environment Lower long‑term support cost Improved employee experience Better alignment with Microsoft’s cloud and security roadmap Many organisations are now accelerating migration to remove the remaining Windows 10 footprint entirely. How Wavenet supports your Windows 11 journey Wavenet provides end‑to‑end Windows 11 migration services, including: Estate discovery & readiness assessment Hardware lifecycle planning and procurement Application compatibility testing Managed upgrade or Autopilot deployment Configuration, security baselines, and Intune alignment ESU planning (where absolutely necessary) Phased rollouts with minimal disruption Whether you’re upgrading compatible devices, refreshing your estate, or transitioning off ESU entirely, Wavenet ensures a smooth, secure, and controlled migration.

Read more