Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

GoDaddy Demonstrated How Not to Educate Users About Phishing

GoDaddy Demonstrated How Not to Educate Users About Phishing

While phishing awareness is an important practice to teach to a business’ employees, some methods are better than others, as GoDaddy—the domain registrar and web-hosting company notorious for its run of risqué ads—is learning the hard way. On December 14, GoDaddy’s employees received an email that seemed to be a holiday bonus from the company… only to find out (the hard way) that it was a phishing test that their employer had run.

Let’s review the chain of events:

The Message GoDaddy’s Employees Received

When the employees GoDaddy involved in their phishing test opened their email on December 14, a message from the address “Happyholiday@Godaddy-dot-com” awaited them. Below, we have replicated the message it contained, under a large, branded announcement of a “Holiday Party.”

I hope you’re sitting down:

---

Happy Holiday GoDaddy!

2020 has been a record year for GoDaddy, thanks to you!

Though we cannot celebrate together during our annual Holiday Party, we want to show our appreciation and share a $650 one-time Holiday bonus! To ensure that you receive your one-time Bonus in time for the Holidays, please select your location and fill in the details by Friday, December 18th.

US

EMEA

Any submittals after the cutoff will not be accepted and you will not receive the one-time bonus of $650 (free money, claim it now!)

We look forward to celebrating with you again, in person next year!

---

I don’t know about you, but if that showed up in my email—just before the holiday season, during a year marred by a terrible pandemic, no less—I would be pretty excited.

However, no bonus was in store for the company’s 500 employees who clicked through the links. All they got was another email, two days later, from the company’s security chief. This was how these employees were informed that the email was nothing but a phishing test, and since they had failed, they would need to retake the company’s Security Awareness Social Engineering training.

Of course, this message did not land very well amongst many of these employees… and it certainly wasn’t helped, considering the “record year” that the email bragged about came after hundreds of employees were reassigned or completely laid off, and a data breach had exposed 28,000 GoDaddy customers’ data earlier in the year.

GoDaddy has since released a statement, apologizing for the poorly-thought-out phishing test. As a spokesperson for the company said:

“GoDaddy takes the security of our platform extremely seriously. We understand some employees were upset by the phishing attempt and felt it was insensitive, for which we have apologized.”

Companies Other Than GoDaddy Have Made Similar Errors

GoDaddy is not the only company to stumble during their phishing evaluations. In September, Tribune Publishing sent out an internal phishing email offering targeted bonuses worth anywhere between $5,000 and $10,000. As with GoDaddy, this attempt saw backlash from employees, one reporter tweeting that the cruelty of it was “stunning.” As happened with GoDaddy, the company apologized for its “misleading and insensitive” email.

In Fairness, Phishing Should Be Highlighted…Just Not This Way

While these examples prove that there is definitely a wrong way to educate users about phishing, it must be said that phishing is a very real threat for businesses of all sizes today.

However, when you try to educate your users, we suggest using different tactics. Seminars and training sessions are great options, and practical evaluations are very effective (as long as you do it differently than GoDaddy). The main issue in GoDaddy’s case was that they took advantage of their employees, during a time when many were already under financial strain, running a test that offered them a sizable bonus when they seemed to have no intention of actually distributing it.

Naturally, nobody should hope that their organization offends its workforce, and nobody should hope that their organization falls victim to a phishing attack. Fortunately, Voyage Technology can at least help you with the latter. Call our team at 800.618.9844 to find out how we can help you address the complicated issue of phishing attacks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Artificial Intelligence Automation Information Covid-19 Cloud Computing Training Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Networking Mobile Device Management Gmail BYOD WiFi Chrome Budget Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Apple App Marketing How To Applications BDR Computing Information Technology Office 365 Conferencing Access Control Hacker Avoiding Downtime HIPAA Website Router Managed IT Services Operating System Risk Management Help Desk Analytics Office Tips Big Data Virtual Private Network Augmented Reality Health Storage Password Bring Your Own Device Computers Healthcare Retail 2FA Free Resource Project Management Windows 7 Cybercrime Microsoft 365 Patch Management Firewall Save Money Monitoring Remote Monitoring Solutions End of Support Vulnerability Vendor Management The Internet of Things Physical Security Display Printer Social Telephone Paperless Office Infrastructure Cooperation Document Management Customer Service Remote Workers Windows 11 Going Green Scam Data loss Excel Settings Wireless Printing Images 101 Content Filtering User Tip Modem Word Multi-Factor Authentication Mobile Security Mobility Processor YouTube Robot Cryptocurrency Smart Technology Data Privacy Employees Safety Virtual Desktop LiFi IT Management Integration Data storage Meetings Saving Time VPN Outlook Managed IT Service Holidays Computer Repair Money Downloads Humor Data Storage Licensing Video Conferencing Entertainment Customer Relationship Management Sports Managed Services Provider Virtual Machines Professional Services Mouse Machine Learning Hacking Administration Telephone System Presentation Cost Management Maintenance iPhone Wireless Technology Antivirus Supply Chain Vulnerabilities Alt Codes Supply Chain Management Workplace Specifications Internet Exlporer Recovery Tablet Fraud Term Microchip FinTech Downtime Hiring/Firing Hosted Solution Username IT Assessment Hard Drives Paperless Alert Black Friday Dark Data Typing Flexibility Domains Managed IT Co-managed IT Value File Sharing Technology Care Database How To Organization Digital Security Cameras Smart Devices Refrigeration Knowledge Business Communications IT Technicians Notifications Google Drive Cyber Monday Proxy Server Remote Working Public Speaking Scams Cookies Memory Travel Hybrid Work Tactics Data Breach 5G Google Maps Hotspot Google Play Lithium-ion battery Techology Videos Unified Communications Electronic Health Records Experience Human Resources Mirgation Entrepreneur Google Docs Bitcoin Running Cable Cables Nanotechnology Wasting Time Unified Threat Management Unified Threat Management Addiction Trend Micro Language Security Cameras Google Wallet Management Software as a Service Undo Google Apps Chatbots Distributed Denial of Service Network Congestion Windows 8 Laptop IT Maintenance Screen Reader Managing Costs User Error Business Intelligence Service Level Agreement eCommerce Computing Infrastructure SSID Drones Surveillance Shortcuts Identity Virtual Assistant Point of Sale Bookmark Halloween Ransmoware Smart Tech Virtual Machine Vendors Download Application Alerts Medical IT Reviews Development Network Management Be Proactive Transportation Tech Support Break Fix Monitors Hacks Browsers IBM Scary Stories Workforce Connectivity Hypervisor Threats Upload Optimization Fun PowerPoint Shopping Deep Learning Social Network Workplace Strategies Employer/Employee Relationships Websites Multi-Factor Security Dark Web Navigation PCI DSS Meta IoT SharePoint Amazon Trends Electronic Medical Records Gig Economy Education Customer Resource management Internet Service Provider Competition Regulations Teamwork Google Calendar Microsoft Excel Evernote Writing Mobile Computing Data Analysis Regulations Compliance Lenovo Outsource IT Star Wars Environment Gamification Memes Search Media Staff Virtual Reality Best Practice Net Neutrality Server Management Social Networking SQL Server Private Cloud Legislation Identity Theft Fileless Malware Financial Data Buisness Superfish Small Businesses History User IT solutions Displays Content IT Wearable Technology Twitter Legal Smartwatch Business Growth Health IT Procurement Motherboard Azure Error Comparison Permissions Tech Social Engineering Directions Telework IP Address Outsourcing Assessment Cyber security Communitications Cortana Remote Computing CES

Blog Archive